Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17252C77562C4193B11838358F752772CE2A8C286C51FD798F2E4825BDAC6D9AC4475F8 |
|
CONTENT
ssdeep
|
384:DjHwOtHx+tkkWJbjkZjH8IG4LGRjkZjH/G4LAk4d+76f:DrwEHxUkLJHk1H8IG4Lsk1H/G4Lc |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c9a2c33d3d71c7c0 |
|
VISUAL
aHash
|
f8f8f8f8f8f8f8f8 |
|
VISUAL
dHash
|
82d1d13233333392 |
|
VISUAL
wHash
|
f0f8f8d8d0b0f0f0 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
c9c8629e8e9a1262,3c27a5939a132e2e |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 25 techniques to evade detection by security scanners and make reverse engineering more difficult.