Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11DA321B021512AAB06D3F99163E3BB1AA1B6D5D4D73B8D9863F4470E4FC2F95CAC2350 |
|
CONTENT
ssdeep
|
384:LTacai3hc2BNBXELiy/Y+nPacLdzfHTqc7bkUzFfIpc7bkUzFfIpc7bkUzFfIX:LFDSWZELk+Cud3h3h3h34 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ab872d2d87852f85 |
|
VISUAL
aHash
|
ffffffffc3818181 |
|
VISUAL
dHash
|
53cd8ecc2b2b332b |
|
VISUAL
wHash
|
ff67e7e781818101 |
|
VISUAL
colorHash
|
06000000e00 |
|
VISUAL
cropResistant
|
53cd8ecc2b2b332b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 890 techniques to evade detection by security scanners and make reverse engineering more difficult.