Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DED2DA20E4549A6303B3C4C4F4356F1AB4D3F32FC92B4A1166F847C9AFD6CA5BE194A9 |
|
CONTENT
ssdeep
|
384:UmCl2rHhSzttttEDCCd2vQnSK8TCDMvwDOgtu+QNDDYp6tEY0lYJ:m+2wDOgtu+QNDDYp1A |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fe03501503f503ff |
|
VISUAL
aHash
|
048181fd8180c1c1 |
|
VISUAL
dHash
|
cc09232345343321 |
|
VISUAL
wHash
|
0481ffff8308c3d1 |
|
VISUAL
colorHash
|
16400030000 |
|
VISUAL
cropResistant
|
786cf0f0f0b0b2b0,cc09232345343321 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 165 techniques to evade detection by security scanners and make reverse engineering more difficult.