Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B6933BF8790DA0271EA383D610AB3107B269512F945C4CF052C4EEA977FCD9AA517FCA |
|
CONTENT
ssdeep
|
768:jlFYk68+ngjw2w2yCQ4fwAJdasg2FTUXwqc2x+ANBFFL0tVF17XAIA7qLKE0pGcQ:bzVbDhVj0jhJPYbfl4GTGli3fZFc+gw |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cdec6ab29a529515 |
|
VISUAL
aHash
|
f9f3fbfefffe0000 |
|
VISUAL
dHash
|
c5677270527ad4d5 |
|
VISUAL
wHash
|
f1f1fafafe8a0000 |
|
VISUAL
colorHash
|
0f200018001 |
|
VISUAL
cropResistant
|
e547727270527a7a,7b5d7536352d1d38,d0e1c608323882c8,02126dc4d4d5d568 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 25 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)