Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13F73C67093015EBF52AB85E9B561F7CDA089D309DB6FD918B3AC039137EAC634D311A8 |
|
CONTENT
ssdeep
|
1536:wTse1FAklKSfRmYACfsVPB6zKZEwVoplieSv1NQBgoH7pHM/rte7KCsaJ:eseQOPwLB0saJ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
92966d6d89696d1c |
|
VISUAL
aHash
|
02664e6e0e080000 |
|
VISUAL
dHash
|
ba8c8ccc98501232 |
|
VISUAL
wHash
|
c77e6e6e5e1c0818 |
|
VISUAL
colorHash
|
30400070000 |
|
VISUAL
cropResistant
|
e9ebd2d2cab296d4,ba8c8ccc98501232 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 300 techniques to evade detection by security scanners and make reverse engineering more difficult.
Drainer supports multiple blockchain networks and checks for high-value tokens on each chain before executing drain operations.