Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18C934BB83549B1271B7343B720AE1503B368121F580E4D60B354FDDAB6B8C9A6877BDE |
|
CONTENT
ssdeep
|
1536:8v39gITXjo9rquNULx4TESLwsGSMBDLw1j90+1Lmjzl:8v39jupTTwsiW16+1i |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
aec46a921b933fe0 |
|
VISUAL
aHash
|
fdf393bfffbfff81 |
|
VISUAL
dHash
|
1167667131727533 |
|
VISUAL
wHash
|
81b1819d8d9bff81 |
|
VISUAL
colorHash
|
07006000040 |
|
VISUAL
cropResistant
|
1167667131727533,45928b82399c9e61,41843b9a9c0e8045,59dd7c989898ad2d,435b236f67672d13 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 21 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)