Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10354D8B25244313F83134AC8F676231A72A6425FDB271844E37CC7F967E7DA6E823985 |
|
CONTENT
ssdeep
|
6144:G7zmesk+ELNsti0ifBG3Sm3su3tzIsLv1pk7zmesk+ESNsti0ifwG3Sm3su3tzIM:jh |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a5522dda2dd835a5 |
|
VISUAL
aHash
|
00e7c3c3e7ffff03 |
|
VISUAL
dHash
|
7186969e4c0c2617 |
|
VISUAL
wHash
|
00c3c3c3c3e7ff03 |
|
VISUAL
colorHash
|
07003000180 |
|
VISUAL
cropResistant
|
6986969e4c0c1617,fffffff3f3ffffff,a4a65251551112b4,24626d555353554d,9253b42576962d2c,1616160609060000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 96 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 1 other scan for this domain