Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19E44C6A4D1B24CBB485B67D8C5716B0232EBD387C78243E457E887512BD9DB6E88F48C |
|
CONTENT
ssdeep
|
1536:sAvPHAd9nprCJCBCs3vut8GCTCVCACeCqCuCSCfC1CUC8CdCsC6CXC/bddsWCNCt:TWZ9LsAIrSVa3bhm |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e1469c708f8f629d |
|
VISUAL
aHash
|
0040606040c0ffff |
|
VISUAL
dHash
|
c084c44c828dbaba |
|
VISUAL
wHash
|
60e0e0e0e0c0ffff |
|
VISUAL
colorHash
|
01000038000 |
|
VISUAL
cropResistant
|
6aa612d0a432a0b4,9808620e16304468,c0993833667ecc9c,8199898db2baaaa8,c1c484c44cc88399,8f8f0f8ccc4d6d69,8f8f0f8ccc4d6d69,8686272f272f4f8b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 11206 techniques to evade detection by security scanners and make reverse engineering more difficult.