Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11BF10E30C0414D124146D5C8B97AB77F2662C30DCB871B1A5FF8AEA6BBDBEA9DD34058 |
|
CONTENT
ssdeep
|
96:zTflXyr9lMzhwoH/6X0zCrAbQcwqgKVaWUG:HNyr9y7H/tz2Ab3fIWUG |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bf8dc063c896346d |
|
VISUAL
aHash
|
ff2f0317010787ff |
|
VISUAL
dHash
|
005a367f734e4c00 |
|
VISUAL
wHash
|
ff2f0301010787ff |
|
VISUAL
colorHash
|
07000000180 |
|
VISUAL
cropResistant
|
005a367f734e4c00 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 15 techniques to evade detection by security scanners and make reverse engineering more difficult.
| ID | Portuguese | English | Trigger |
|---|---|---|---|