Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12BA3863C5356183E6213C7F0E6A0BB2D61AFD34ADB27494CE3A853F5A7CAC44CD19698 |
|
CONTENT
ssdeep
|
768:PiE4nnn1aZmRH6ruU9ND6GUDgF70tyZrkxVxjNwKjVU1x5bwKjVW1xHowKjVW1xN:en1paywtQtWrOiPoO7puDv |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9414af2b7af272e0 |
|
VISUAL
aHash
|
007f7e080000fff9 |
|
VISUAL
dHash
|
f0f6d490f200930b |
|
VISUAL
wHash
|
007ffe1c0000fffd |
|
VISUAL
colorHash
|
33402008040 |
|
VISUAL
cropResistant
|
7efef636367476a6,d9b265dbb46d92a5,458e17287ca2428c,804c4c4c4c0c4d75,a280b333d68c6565,a28a8c8c8e964565,808d86339f867545,a0003d03033b6d6d,82102c3d3b3b2745,a28c8e868e8c6d75,f0f6d490f200930b |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 29 techniques to evade detection by security scanners and make reverse engineering more difficult.