Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16F43746052335A6B02A382D1A6BA9F9DD0C08350D3674B69F3FC876FAECDC44BD55262 |
|
CONTENT
ssdeep
|
768:kmxxiM5mSTwHZVH2WPg04L3MC0hEC63xG0q87F:LYAmSTwHZVH2WPg46hGd87F |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bad74c2a109596d7 |
|
VISUAL
aHash
|
04a0fe4cc5818100 |
|
VISUAL
dHash
|
1c494c9919252711 |
|
VISUAL
wHash
|
04f5fecfcdc38101 |
|
VISUAL
colorHash
|
300000084c0 |
|
VISUAL
cropResistant
|
1c494c9919252711 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 155 techniques to evade detection by security scanners and make reverse engineering more difficult.