Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16AA16473E2099C272771C298AFCAF389976642C6C4394D20E3ED56DF06C6EB5E973205 |
|
CONTENT
ssdeep
|
48:TcRbtmZYMd6fXdwPTZP6rEx42rIdTTZiP6L00J3ojWujXjsjg8jl1AsNs8TTZiP/:TcvrNwsEPWCzEPJqqJWIG6yi5L/lZ1I1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cb4bb4e46496b52c |
|
VISUAL
aHash
|
fbf93939f8f9ffff |
|
VISUAL
dHash
|
836b6bd353132802 |
|
VISUAL
wHash
|
4119393818f8defe |
|
VISUAL
colorHash
|
07206000040 |
|
VISUAL
cropResistant
|
836b6bd353132802,434b45c70635346e |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 21 techniques to evade detection by security scanners and make reverse engineering more difficult.