Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T175D321B23E436821605F12CF511B330D61C1DBC9EF23B9D095F0922DABF5E61BBA1A95 |
|
CONTENT
ssdeep
|
1536:NEscpdshQk4XkXdjJ78J768eLgJiJsJBJHJrJmzJLJxJvJ6gJjJE2jnUgmni9p6K:NEdUoJgB6TKmHy |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bfb7526840452f1e |
|
VISUAL
aHash
|
008f8ff7c1810000 |
|
VISUAL
dHash
|
82381cce272b3233 |
|
VISUAL
wHash
|
408f9fffd7c31800 |
|
VISUAL
colorHash
|
1a003001040 |
|
VISUAL
cropResistant
|
030e9cc018180891,e0a058f8f07cbcb6,1cd8b8d8f8b0b0fa,82381cce272b3233 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 66 techniques to evade detection by security scanners and make reverse engineering more difficult.