Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T184234B726731B8A983DB51EEEB382D49B2C5589DECCB4410F5C9968D23C7CD02287BB4 |
|
CONTENT
ssdeep
|
1536:aj+EsZ/8vDVRfMjBRRqMjBeDrpRXPZlQaQD9OehM+BrUgq4z:asyR6RODrpR/PkEeDz |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ead09537e4c0c5b5 |
|
VISUAL
aHash
|
ffbdfdf981818181 |
|
VISUAL
dHash
|
7971716145495145 |
|
VISUAL
wHash
|
ffbdb9f181818181 |
|
VISUAL
colorHash
|
190000001c0 |
|
VISUAL
cropResistant
|
7971716145495145,f8f0e0e0c4c0d4c4 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 17 techniques to evade detection by security scanners and make reverse engineering more difficult.