Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CFD3EA63D21C257D09371AD0B618273F78D1608EDB9A19EAB1FEC3A413F6CE1B592193 |
|
CONTENT
ssdeep
|
3072:5iDGgE28z9NMZ8ssy3GgXG1eGu/Jja7l7YU4L/tnYwxWqCY65Y:5iDGgE28zM9v2gWUGu/JjY7YU4L/tn79 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b1334e4e6671195b |
|
VISUAL
aHash
|
00ffcfc3f7ffffe7 |
|
VISUAL
dHash
|
9c1c9c1e06161e0e |
|
VISUAL
wHash
|
00c7c7c3c3c7c3c7 |
|
VISUAL
colorHash
|
07007000400 |
|
VISUAL
cropResistant
|
0c1c1e1616161e0e,809493ccdccc9280 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 13 techniques to evade detection by security scanners and make reverse engineering more difficult.