Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19E81941141109C334983D5E42AA5AB5B328887B9C603590DF7F8876E2AE3DD8CF67629 |
|
CONTENT
ssdeep
|
96:kS2sUjd42eUEz1YJNPDCZ49O3X9/GmLNmLc:/UEz1kNPDk49O3X9/r |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
89dc26f0d926d9c9 |
|
VISUAL
aHash
|
0000181818180000 |
|
VISUAL
dHash
|
504cb2b2b2b2ce7b |
|
VISUAL
wHash
|
f87cfebf5f180000 |
|
VISUAL
colorHash
|
000000001c0 |
|
VISUAL
cropResistant
|
aea0aaaa8232b2e0,504cb2b2b2b2ce7b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
| ID | Portuguese | English | Trigger |
|---|---|---|---|
Found 6 other scans for this domain