Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A272517562085A3E519383E5D776337B73A99285FA1B23085AFD436C8B92F4CDE33290 |
|
CONTENT
ssdeep
|
192:hM/HTSTS8nVJxUKdJ5TUMapXimFz8X/xk+w25EPRbIIDwZmrqHFiI5Mr0zU1m:i+e8JxUK54MapXfc/7d+PRUIAmOMr6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c7cc3c323630e3c7 |
|
VISUAL
aHash
|
0678782070700c00 |
|
VISUAL
dHash
|
9ce2c2c4c4c0b944 |
|
VISUAL
wHash
|
7e78787870787c60 |
|
VISUAL
colorHash
|
38000000007 |
|
VISUAL
cropResistant
|
9ce2c2c4c4c0b944 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.