Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B6243A6832D132B786EB307C647F860AB633A91188059614FA3DD4D55EF890BA437FBD |
|
CONTENT
ssdeep
|
3072:KlyV+22khACAoojCamWR+iH+oiIgWCLI39B+F0uJZtqiYpj:Ki+2SomCamWR+iH+oixLI40uJ+iYpj |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d2d2dd2d8d5a2265 |
|
VISUAL
aHash
|
f8fce4fcf06000fe |
|
VISUAL
dHash
|
300889c9c5cc18e0 |
|
VISUAL
wHash
|
f8fce47cf02000fe |
|
VISUAL
colorHash
|
060030000c0 |
|
VISUAL
cropResistant
|
300889c9c5cc18e0,86951f2b3f166d7f,952d2b56ac291327,4cb1658b2c7967cf,82849993078eb863,31b634b4b6b2b2cc,5cb063c489275e70,61e5cb96244d9b1a,30000c70800000c0 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 19 techniques to evade detection by security scanners and make reverse engineering more difficult.