Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17771D863C00CB05E0544C2C493C7F69659198952DA462E99EA980BEDC8DEBB1F17326F |
|
CONTENT
ssdeep
|
48:VT6CknyQU99aJKyjavzOLa6Ckxh3TNmTN/NQU99aJKyja7usTN30LmGqPGZ7LJ7y:96/yAKKZa6/WAKKCR0inCNa+ZSkKl |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8c1933666639ddcc |
|
VISUAL
aHash
|
001819191b1b0f07 |
|
VISUAL
dHash
|
ffb3b3b3b3b3f7ff |
|
VISUAL
wHash
|
01191b1b1f1f1f1f |
|
VISUAL
colorHash
|
38400030000 |
|
VISUAL
cropResistant
|
ffb3b3b3b3b3f7ff |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.