Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18383537292542437617B79CAF164771EA2D3C70FCA8246E1A6F8939A0FD6CE1F81344E |
|
CONTENT
ssdeep
|
1536:UJmXWn9rfCb+I5XyYuOgh4ZZ7Hw7Hw7Hf7Hz7HI7HY7Hp7HS7Ht7HJ7H77HL7H7W:4mXWlCbVuON7Q7Q7/7T7o747J7y7N7pO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b2465363cd98ccbc |
|
VISUAL
aHash
|
0000d3ffc3c3cfff |
|
VISUAL
dHash
|
c8c836301606181a |
|
VISUAL
wHash
|
0000d3dfc3c3cfcf |
|
VISUAL
colorHash
|
07200010080 |
|
VISUAL
cropResistant
|
c8c836301606181a,be391d1b13939e93 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 229 techniques to evade detection by security scanners and make reverse engineering more difficult.
Found 10 other scans for this domain