Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1067138226288081B43377B4CAC51273D55B3996B8F6B4F46266CDD4FBED1F16AD0418F |
|
CONTENT
ssdeep
|
48:rvW4GeXGeYJSDh9AlsDu6ZOw2KE2Tw9SEQQylCtonWHzPpyyiJ2g2o4To2B2zkLP:rD5X5YJo9nZ6EwyQYyyy12znu |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec6c929293c56d6c |
|
VISUAL
aHash
|
ff83d3f3ffc3ffff |
|
VISUAL
dHash
|
483636560a1e0000 |
|
VISUAL
wHash
|
fc8c81f1a9813c3c |
|
VISUAL
colorHash
|
070000021c0 |
|
VISUAL
cropResistant
|
483636560a1e0000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 50 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 4 other scans for this domain