Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11252B5758221FA3E4283C3E99F24732D6266D2D2E5570A0463F5CB2DAFC1F9DCC12166 |
|
CONTENT
ssdeep
|
192:6BMOJYzLAkfaSpstZVEjT683gEgBfqKI0SJHkc1O:6g0RLEjT683gEgBfRpSq |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a52d9b872d656165 |
|
VISUAL
aHash
|
ffffc3c3c3e7ffff |
|
VISUAL
dHash
|
ec4c9696968e0c92 |
|
VISUAL
wHash
|
2707c3c3c3c3c34f |
|
VISUAL
colorHash
|
06003000180 |
|
VISUAL
cropResistant
|
ec4c9696968e0c92,60e0f0b0b0f0c060 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1 techniques to evade detection by security scanners and make reverse engineering more difficult.