Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T167E12FE1C411DE37076286C5E7B56F4B7692C349CB07098097F883ABABCAC60CA2659D |
|
CONTENT
ssdeep
|
96:Tk1Rc8G4STB9iEdt7AvhYZ0cFf4jeXIHF/dUXcdz/3tJVQYUST5J:Q1Rc8GxjiEdmvhIazJzv7VQOb |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e9e96969e141c3c5 |
|
VISUAL
aHash
|
e3ffffffff000000 |
|
VISUAL
dHash
|
072b403300208000 |
|
VISUAL
wHash
|
c3c3ffffff000000 |
|
VISUAL
colorHash
|
07200000180 |
|
VISUAL
cropResistant
|
c72b034033303030,5343676767a5a5a5,0040404145408000,0000000000000000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 59 techniques to evade detection by security scanners and make reverse engineering more difficult.