Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13A912575A009A9362693DBD9BAB0A31FE193C789CD47068697F8431E0FC6DF8C852242 |
|
CONTENT
ssdeep
|
96:nfkp85VubrvKPztCvoB2ytZfXD3Kwl+QBvlPamyU99J5:nfsYEb2B7Dn |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fbd2cbe1242e2499 |
|
VISUAL
aHash
|
fcecc08182c09898 |
|
VISUAL
dHash
|
9919190f16163b32 |
|
VISUAL
wHash
|
fdfcc1c1c3c09998 |
|
VISUAL
colorHash
|
16e00000000 |
|
VISUAL
cropResistant
|
c6a506130d0c161c,1a18b9999999c849,3333270f1f1f1f1f,9111150f36367372 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 22 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)