Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16F54D8B25244313F83134AC8F676231A72A6425FDB271844E37CC7F967E7DA6E823985 |
|
CONTENT
ssdeep
|
6144:G7zmesk+ELNsti0ifBG3Sm3su3tzIsLv1pk7zmesk+ESNsti0ifwG3Sm3su3tzI8:vh |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a5522dda2dda23a5 |
|
VISUAL
aHash
|
00c3c3e7e7e6ff03 |
|
VISUAL
dHash
|
79968e4d0e0c2617 |
|
VISUAL
wHash
|
00c3c3e7c3e73b03 |
|
VISUAL
colorHash
|
070060000c0 |
|
VISUAL
cropResistant
|
69960e4d0e4d1617,fffffff3f3ffffff,a4a65251551112b4,2c626d555353554d,3454455575535b33,1616160609060000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 183 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain