Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17D61352F971C455A0B12C1C5B558339E496A319DF6ABDEC57EF8D058A788E2E0A310CE |
|
CONTENT
ssdeep
|
96:TMrPuw/rNmSlom4imfmnm4ymVmeymSH+omG6WP6WP6lV:orPuwTke4humGcMe+oj/GV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b616e9c13986cc6b |
|
VISUAL
aHash
|
0000040400ffffc3 |
|
VISUAL
dHash
|
03ccececdcd02b13 |
|
VISUAL
wHash
|
0006160604ffffff |
|
VISUAL
colorHash
|
32003018000 |
|
VISUAL
cropResistant
|
786464e494fcb2e2,191942ac2b131733,33ceccfcececcc48,52daba606162b171,5632327169717931,36b2327a69717179 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.