Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1AFE121F1D004DD3B435289E9A7F66B1B76D1C349CE03094493F893AB5BDAC60DB22A99 |
|
CONTENT
ssdeep
|
96:Tkf51DtSTBJ8v67oKwWtGKFvyXzHF5OXjHFiaXkz/u7YQzEmST5J:Qf51DcD8i7tG58ez27pzEDb |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
dc5c5cf372727220 |
|
VISUAL
aHash
|
001800ffffffff00 |
|
VISUAL
dHash
|
70b2329400000000 |
|
VISUAL
wHash
|
000000ffffffff00 |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
01a2a2a2a2a2a201,41a2a2a2a2a2a241,82a2b2cc32b2b2b2,c000000000000000,5000b2b2b2b25432,0000000000000000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 64 techniques to evade detection by security scanners and make reverse engineering more difficult.