Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1509372BD044329E7B53BC95721203769D03213ABEF76144AFAE5B258DFE6C408AE953C |
|
CONTENT
ssdeep
|
768:vvPVnPV3hkYpaOQBCsYpZzaJnYphJyIvd1PYpnh5OQBCmzaJjJyIvd1YYp3YpDYN:xK0+2q5R+jQEwChvADgNf |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
92122aeded4d25ad |
|
VISUAL
aHash
|
00000000ffffffff |
|
VISUAL
dHash
|
c9e9ccd03f161b23 |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
06400010080 |
|
VISUAL
cropResistant
|
70cc8e86adb6c070,0012cc2b33e40200,782b17963b1b2323,13c9c9c9e8ccd438 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.