Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T129F20D13A280853E4ED740FDDA8CB65A578C5084F731D5C23AF6863FA6A2DAD343678C |
|
CONTENT
ssdeep
|
768:/BW1zvHm4ftJbm8c34+HgefBUstSazhHS:/BW4YtJm8cI+HgQBNtSazhHS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b97986c46c099b3b |
|
VISUAL
aHash
|
81818181c1ffffff |
|
VISUAL
dHash
|
230b0b2b2b270f36 |
|
VISUAL
wHash
|
8181818181ffe7ff |
|
VISUAL
colorHash
|
17000c00040 |
|
VISUAL
cropResistant
|
230b0b2b2b270f36,1fdfcf8e64e6d0e0,6c93840c8c885a5a |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 10 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)