Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F0627231F075253E012F75D0F1A6670AE2DBD34ECB628BE4A67893A457D9CD1AC27206 |
|
CONTENT
ssdeep
|
192:4tiF8D/opElPptJkT7NdfA1aHrI7QOWbLLJzdlACJQtIv1+25MqfYccXE4vrz12/:9wwpYPHJulnLLJJZ4E1tQJ1wVV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c3e73c383c383cc3 |
|
VISUAL
aHash
|
02627676742c0c08 |
|
VISUAL
dHash
|
cececcccccc8f8f0 |
|
VISUAL
wHash
|
0272767e7e2e0e1c |
|
VISUAL
colorHash
|
00000000038 |
|
VISUAL
cropResistant
|
fbfef6ec9870c080,6260fa9a803372f8,65656767e6e6bcec,d8d0b060c0800000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)