Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A05232B29415A93B1263C7D9B7B2A64BFB818189CD82054FD8F5D35C1FF2DA1ED0A311 |
|
CONTENT
ssdeep
|
192:imVnFbO7GtNwthQ6M55ycLVYGpU5cTBrlE4:XFC7nhQ6M55ycLnp6IBxF |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
de5e6961e11c1e92 |
|
VISUAL
aHash
|
80809c9cffffffff |
|
VISUAL
dHash
|
33383c3438202024 |
|
VISUAL
wHash
|
80808c9cfefcf4f4 |
|
VISUAL
colorHash
|
070020001c0 |
|
VISUAL
cropResistant
|
33383c3438202024 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 11 techniques to evade detection by security scanners and make reverse engineering more difficult.