Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T156E142E1C024DD36075286D9F7F96B1B76A2C349CF07188453F893ABABCEC60DB21599 |
|
CONTENT
ssdeep
|
192:QVYJHyELiEdPBGXOGBAvPq+GQ/61Frvr/:Q4RLXZwh3Q/m |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b98c9ec6e2e21999 |
|
VISUAL
aHash
|
0f0f0f0f0f0f0f0f |
|
VISUAL
dHash
|
7e3e1a9e9e1a1a1a |
|
VISUAL
wHash
|
0f0f0f0f0f0f0f0f |
|
VISUAL
colorHash
|
06007000080 |
|
VISUAL
cropResistant
|
68e8ec7c6c6c6868,71e0dcbefe9efc71,eaaaaaaaa88c4848,0000000000000200,060703c8c4000003 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 59 techniques to evade detection by security scanners and make reverse engineering more difficult.