Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E7C231B0A780AC53A827B94AF684D7CCD01A0549FBC99BD9F148CE8417DF8FB4D406A7 |
|
CONTENT
ssdeep
|
768:ATQTnmXVsw4Sue2Kynkjv/dBxBEj5gp91j/XnHSgA0sWCyqKFglZhfrDD/cgOKKm:EUhRd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b0439f1e8fe0c0db |
|
VISUAL
aHash
|
ff0040400000ffff |
|
VISUAL
dHash
|
f0999787ed961632 |
|
VISUAL
wHash
|
ff00c1430900ffff |
|
VISUAL
colorHash
|
03009000180 |
|
VISUAL
cropResistant
|
000c0694d4844c79,8940cc084c88e884,c3eaecc881c3c793,da92929b9a9e9eba,6666d81edafe388e,9616360016120e26,799d9797e5bda416 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)