Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T123C1857472511B7F51C381F6F762ABAAF684C356C63B9748A6F9C2C50BC6C2ACE14390 |
|
CONTENT
ssdeep
|
96:dBqXmmyCekg3VJr945uH0kzbKWRAZt6ItarZeYp:dBqJle5X25c0QRU6p |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c0c03b3f3f3fc068 |
|
VISUAL
aHash
|
7070707070700000 |
|
VISUAL
dHash
|
a6e4e4c4c4e41b80 |
|
VISUAL
wHash
|
70fcfc7e7c7e0000 |
|
VISUAL
colorHash
|
31007000000 |
|
VISUAL
cropResistant
|
8080b217cf888280,80898855452559b8,84535b97974b5780,a6e4e4c4c4e41b80 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 6 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)