Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E1829431312939EB926B8EA7F023BF7D72B9C10DC14788A8B2FD819C17DFC509566658 |
|
CONTENT
ssdeep
|
192:ji/bWgR4yqoBfqo9b9ZlsT7hy3F6FUGm6iW+qVyndMWSoN/Y:jObBBXhUQIFixMWSoRY |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c346ad609b9e719a |
|
VISUAL
aHash
|
0070647c6c60ffff |
|
VISUAL
dHash
|
c4c6c9c9c99c301b |
|
VISUAL
wHash
|
007074746c40ffff |
|
VISUAL
colorHash
|
38006000000 |
|
VISUAL
cropResistant
|
c4c6c9c9c99c301b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 12 techniques to evade detection by security scanners and make reverse engineering more difficult.