Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1FB71A970502EAD771587D3EA7AB6F70B72C1821ACB9B220156F8A39D4AD6DD2DD22001 |
|
CONTENT
ssdeep
|
48:ToKkkcpkrTNmTNM8cCz6Vc1kauE4kkhSSbyue2XrxSM/J1h1HC6y:ToKkbXbJclkkhSSGue2Xp/Vw6y |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8e7d79d2ce21118e |
|
VISUAL
aHash
|
8080003d3d1f0703 |
|
VISUAL
dHash
|
3f3f6be9e9f9dffb |
|
VISUAL
wHash
|
80811d3f3f1f0f0f |
|
VISUAL
colorHash
|
18000c00000 |
|
VISUAL
cropResistant
|
3f3f6be9e9f9dffb |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 8 techniques to evade detection by security scanners and make reverse engineering more difficult.
| ID | Portuguese | English | Trigger |
|---|---|---|---|