Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D713427284B5B43B016FB2D1A22C7B09A3C3838BDB561BE553FC835C8B86E95DC63519 |
|
CONTENT
ssdeep
|
384:+yNzz8eYuVor+u9iG8SWtuQ3jKjV/FcGmzbssFzIZ:jpwJuWL7azId+zws5IZ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec689993979686c6 |
|
VISUAL
aHash
|
c781d1f3e7e7ffff |
|
VISUAL
dHash
|
2b232707040f0e0e |
|
VISUAL
wHash
|
818181e1c3e7e7e7 |
|
VISUAL
colorHash
|
07240000006 |
|
VISUAL
cropResistant
|
2b232707040f0e0e,2f5f1e3e3b276f4f,533748416474cccc,14ce0a5a1d1d1c17 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 521 techniques to evade detection by security scanners and make reverse engineering more difficult.