Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A953637191542A3702A751A7F3A01755AFE3E5D3C8126EC072FEC38F56C3C91C9DAA2A |
|
CONTENT
ssdeep
|
768:JuKixor/rds4CisxIez4OKp4CLufDTw+/kVzw+/kVzw+/kVP:EKaorTKdisxInOEufb/kVP/kVP/kVP |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
90cd2f63e199f861 |
|
VISUAL
aHash
|
491c1e5ee1070f0c |
|
VISUAL
dHash
|
9b38b8b88bad793a |
|
VISUAL
wHash
|
c91e0a5e670f0f0f |
|
VISUAL
colorHash
|
30000000e00 |
|
VISUAL
cropResistant
|
9b38b8b88bad793a |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Found 1 other scan for this domain