Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16951F037E038680C0340ADF5BD1231CDD6DA840FEA91AED5BAA0B15DE795A6545B3147 |
|
CONTENT
ssdeep
|
48:JaSmSdSUTZTPO4T+u/gjlAYHLth/1jzSOZv:JBTPhT/4jltLthNjVv |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bec9c13c30c13e3e |
|
VISUAL
aHash
|
ff9fbfff8383ffff |
|
VISUAL
dHash
|
fb3767c3262e0204 |
|
VISUAL
wHash
|
190303138383ffff |
|
VISUAL
colorHash
|
07201000600 |
|
VISUAL
cropResistant
|
fb3767c3262e0204,929dcc8f98adac54,292c54dce04c4c4d,edac9c8c9accd839,24a7ceae8c8c5a55 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)