Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11DB294308568603A02B74FE4B436AB5E7697C39DDA938598A3BCE3A05FC7CE4DC159C0 |
|
CONTENT
ssdeep
|
384:QDWOwZRuRZ7faHG+P3K786mCPsn2RjGBK80:8WOwZRuRZ7faHGGK786mCPs2Rjd80 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b8b80787954e4ecb |
|
VISUAL
aHash
|
ffcfc1cfdf300000 |
|
VISUAL
dHash
|
3e1b3b1b18e531b2 |
|
VISUAL
wHash
|
ffcfc1cfff100000 |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
391e3b333b1a18e5,a28282e2e2a282a2,a880a28e8c8e80aa,0000080808080000,c069d4c419ccc813,e9e898c868585858,222b7b0b0bf9dcde,2534b171323210b1 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2086 techniques to evade detection by security scanners and make reverse engineering more difficult.