Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T153D132E0C454ED3B4353C6D9A7F56B0B7791C349CF06094493F893AB5BCACA0DA2269D |
|
CONTENT
ssdeep
|
96:TkQ1sMz8pDfSTcHDv8Gdwvl9eJXxHFDeYeXUg/E4YJR:Q4sMz8puwb8G1fMYjg84G |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e164ce8e9b998e92 |
|
VISUAL
aHash
|
ffc3c3c3c3ffffff |
|
VISUAL
dHash
|
0096969696000600 |
|
VISUAL
wHash
|
27030303c300ffff |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
0096969696000600,41a280a2a2a28241,658280a2a2a28201,26a686e6f080a201,a91e69696970b469 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 64 techniques to evade detection by security scanners and make reverse engineering more difficult.