Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DB832BB43519B5275AB343A710DE11037378231B980E4C207264FD9EA6F9C9AB17BFE9 |
|
CONTENT
ssdeep
|
1536:nKDTMlElUuRNka2wblHbJLwLIz9GguGOjjRnK:nKDTSQrX2wd9W/guGO4 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e5189067c7e79265 |
|
VISUAL
aHash
|
e383c3e3e3f7e3e3 |
|
VISUAL
dHash
|
2f3f2b0b4f4f4fcf |
|
VISUAL
wHash
|
8383c3e1e1e3e1e3 |
|
VISUAL
colorHash
|
07002200080 |
|
VISUAL
cropResistant
|
2f3f2b0b4f4f4fcf,80402a49c9350680 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 43 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain