Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16BF10EE1D054ED3A435382D5B7B96B4B77A1C389CF470A4493F483ABAFCAC60CB21599 |
|
CONTENT
ssdeep
|
96:TkVnfzD71tkz3t8v67McddtFlytB7aCwvFVeseXbHFjeRXOX/gabtSEqzR:QVnfzD71U3t8iIGdPlyX7RsM4oX5YEq9 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e4336d6692c996c6 |
|
VISUAL
aHash
|
c3c3ffcfc7f7c3f3 |
|
VISUAL
dHash
|
1e96281a0d261606 |
|
VISUAL
wHash
|
24000000c3c3c3c3 |
|
VISUAL
colorHash
|
07000038000 |
|
VISUAL
cropResistant
|
1e96281a0d261606,00d02c2c2cac40a8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 64 techniques to evade detection by security scanners and make reverse engineering more difficult.