Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12F135A726332B86883DB92EEE7382956B2D6489DF8C74414F5C95ACD23C3C816193BB4 |
|
CONTENT
ssdeep
|
768:al+EsZx8/G8F4qDawWMABDwUMABVUcix+y9dQpUDF1E56ITmHkLcZI2jPqDvBAzx:al+EsZ/8OqDawWMABDwUMABVUXx+y9dl |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bf3f90e0c6c6e0c2 |
|
VISUAL
aHash
|
818181819bc3ffff |
|
VISUAL
dHash
|
7d71717163233331 |
|
VISUAL
wHash
|
8181818193c3ffff |
|
VISUAL
colorHash
|
03000000780 |
|
VISUAL
cropResistant
|
7d71717163233331,fffffefefefcfcf9,8000100000100000,4824b2502d008c01 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 17 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 4 other scans for this domain