Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B732EAB5E3445E2B41C387D5B3A2B725BA8AD1A1DFC60A1990F4879D4EC7E79CC0C449 |
|
CONTENT
ssdeep
|
192:uLPMaegx6GtvAnxj8O5ji5ktIPel8mKYihpLx7/+vRLGVQQHJULoBl1S+4XmRmov:uL0ajx6GtvAnpJI2/S7GvRLSQQHJULoJ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d6b48d80c9ea62af |
|
VISUAL
aHash
|
fffee66666662400 |
|
VISUAL
dHash
|
acaccccccccccce0 |
|
VISUAL
wHash
|
ffeee66666642400 |
|
VISUAL
colorHash
|
12201000040 |
|
VISUAL
cropResistant
|
acaccccccccccce8,acccccccccccccc2 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain