Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C5032BE87852F1129AB751E740EF1807337E561B280D4970A225FEDE74B405AB0ABFDD |
|
CONTENT
ssdeep
|
768:WMZaA8+M4y3MHhIv6RGzWmKCoUzqH4n5/uQ8/y:L7y3UfzQf |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e7271999998e2696 |
|
VISUAL
aHash
|
0400e7e7ffffffe7 |
|
VISUAL
dHash
|
694d4d0f3008110c |
|
VISUAL
wHash
|
000020c3ffffbae7 |
|
VISUAL
colorHash
|
07000040006 |
|
VISUAL
cropResistant
|
694d4d0f3008110c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 10 techniques to evade detection by security scanners and make reverse engineering more difficult.