Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13C35D751E1A22433203F52D9E4B96B097193F76AD7420BC1E7F443B81BFBC69B81B598 |
|
CONTENT
ssdeep
|
6144:qafi+UdVEFNszZ6BxCo62HzWqnSMlcryHQnIDFYUwA5Sczb147e8qV6F76oY/sIN:roMSIx6142Y/sIGGr+fKTyvSQ4mW |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9e1e43431e1e1e1f |
|
VISUAL
aHash
|
00ff9f9f9f9fffff |
|
VISUAL
dHash
|
e03e393d3d39191f |
|
VISUAL
wHash
|
008f8d818d8dedef |
|
VISUAL
colorHash
|
07207008000 |
|
VISUAL
cropResistant
|
8282c2c2c2828282,963b393539391917,c0c9e8c8c016a622,75b5353135353533 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2751 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)