Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C3E110E1C454ED37436786C99BB56B0B73D1C349CF43098093F883AB9BCAC60DA655AD |
|
CONTENT
ssdeep
|
96:Tk1SzeFvMSfuSTCctutQ2SS8ct7JTWnF5ZjOX3NwvFKexXHz/2TYfYfGJ:Q1SzeFdjWcktQMXTW26dzEsuA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8a5c7d770b5a6285 |
|
VISUAL
aHash
|
00f318183fffffff |
|
VISUAL
dHash
|
3116f9f9edcc10c3 |
|
VISUAL
wHash
|
00d018001df7ffff |
|
VISUAL
colorHash
|
07098000200 |
|
VISUAL
cropResistant
|
3116f9f9edcc10c3,2929012129290901 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 64 techniques to evade detection by security scanners and make reverse engineering more difficult.