Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T114112151508A1D2B8C6343E21BCBB71EA2C19A49E5069F4195FD43CA0BC0E98D6271D0 |
|
CONTENT
ssdeep
|
12:hCxsTL5UmiNE7w4iJxSMZxJs4bF5XjbjsU0MUtyQkzsigwj/dZDPidwb:hHTLKmiNX4kxSMZ/s2XXSyZsVwjjDWwb |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
99cc663398ce3333 |
|
VISUAL
aHash
|
0018183c3c180000 |
|
VISUAL
dHash
|
3032b2b232320c20 |
|
VISUAL
wHash
|
38383c3c3c3c0000 |
|
VISUAL
colorHash
|
00000000007 |
|
VISUAL
cropResistant
|
f0f00323ba967d79,3032b2b232320c20 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 56 techniques to evade detection by security scanners and make reverse engineering more difficult.