Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A37362347901682630EF4ACEE277798E2284EFC6C99629D9C6F0472459F7C61FED02D9 |
|
CONTENT
ssdeep
|
384:iW11/QSvlo/STLTZ94CZl4a7a3pGxa7a3pGxa7a3pG+yGa7a3pGS1ca7a3pG0a7E:lYO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
aef4f3d848c9064e |
|
VISUAL
aHash
|
ffc7330101033b21 |
|
VISUAL
dHash
|
8e066e632777f3c7 |
|
VISUAL
wHash
|
ffc7330101177b61 |
|
VISUAL
colorHash
|
0e000038000 |
|
VISUAL
cropResistant
|
0e066e632777f3c7,fe80b2d2d2d4d0c0,31e0dc9c1ad8c040,ccccccaca4a52437,b3b2b2b28e8ccccc,e832ceccccdae001,ff80a29e80a38f80,000040d0d0c04840,1e666b2727f7e3c5 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 56 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)