Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1450375F8C1CA963742D142D15A717B6976D35A8DCB033E1897ECD26ABB4DD8AEC100BC |
|
CONTENT
ssdeep
|
768:LGgFhuKHarRbJfuoLClt5oEgrzDr5ix/0dnSRWwFRL4MXtrimiV4/SUSIEYNd/Aq:LGTrRbJfuoLClt5oEgrzDr5ix8dnSRWo |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cea4e99b324ce692 |
|
VISUAL
aHash
|
fffb76003c3c3838 |
|
VISUAL
dHash
|
320245656d606170 |
|
VISUAL
wHash
|
fffb24143c383838 |
|
VISUAL
colorHash
|
06e00000000 |
|
VISUAL
cropResistant
|
0000223232320069,9245657d69606170,6969717171710669,18e4e42426c8c8d8,1387a7a783d2d78f,b4b44c4e40b6b5b9,92444c6c40525252,5545611d04061140 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 35 techniques to evade detection by security scanners and make reverse engineering more difficult.