Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T146B272B6A2C6313B034383CEFB25BF7DE0E7059EC6960909DAF918646BD2D95D6C0099 |
|
CONTENT
ssdeep
|
384:AaF46uPA6DkCpPCpkUdf0Q4cEH7NLADXmu70MTy4yS4wUjwzYfMhExsfR7CW/spe:hFqNUYa6IIildIfHBSGnJynrKe |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bc96876d2d349634 |
|
VISUAL
aHash
|
ffffffc381818181 |
|
VISUAL
dHash
|
5613283b0333032b |
|
VISUAL
wHash
|
92ffffc381818183 |
|
VISUAL
colorHash
|
160000001c0 |
|
VISUAL
cropResistant
|
303c2e2b0333030b,4341566656564649,0111013131010101 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)