Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A953637191542A3702A751A7F3A01755AFE3E5D3C8126EC072FEC38F56C3C91C9DAA2A |
|
CONTENT
ssdeep
|
768:JuKixor/rds4CisxIez4OKp4CLufDTw+/kVzw+/kVzw+/kVP:EKaorTKdisxInOEufb/kVP/kVP/kVP |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
91d92f62e1bd6861 |
|
VISUAL
aHash
|
481c1e1f6d0d0f0f |
|
VISUAL
dHash
|
9b78b2b88bb97d7c |
|
VISUAL
wHash
|
491e0a1f6f0f0f0f |
|
VISUAL
colorHash
|
38000000e00 |
|
VISUAL
cropResistant
|
9b78b2b88bb97d7c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Found 1 other scan for this domain