Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A1D164792440A63B03D312D23B729B0A7342C1938A67174636F5D75E6FE6F0ECD6728A |
|
CONTENT
ssdeep
|
192:hXD2SVU2LmlV3edYz78SDqj2b7gSoO17x:hXySVUpV3saYkqjSgPC |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ecb633890c7b2ce4 |
|
VISUAL
aHash
|
0000d7fbfbdb8000 |
|
VISUAL
dHash
|
16542623a233194a |
|
VISUAL
wHash
|
0086d7fffbdb8800 |
|
VISUAL
colorHash
|
1a402008000 |
|
VISUAL
cropResistant
|
b5aa7254c89831e3,d1e9694cc8f97bee,80287c5a5e76b2b0,c0e0aa82c416be7d,16542623a233194a |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 3 other scans for this domain