Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A1434461D1C57D37056381C8DAB4EB5AA2C140E9CE870A4692FAC7DEFB4AFA1C8075CD |
|
CONTENT
ssdeep
|
768:VN0+i9UsTb48q+Oqp3JWDbkS57rIhip9byAgTbasif6+sx19diyUj3:4+i9ixsT9d0j3 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c841bc15be43b66b |
|
VISUAL
aHash
|
387a6078003e1cdf |
|
VISUAL
dHash
|
f2f2c3d59df4b026 |
|
VISUAL
wHash
|
587a707c005e1cff |
|
VISUAL
colorHash
|
0a006000000 |
|
VISUAL
cropResistant
|
daca6c6cdc8c4c50,ccccccccccccaeda,20a0a082524a0ef2,c3e4ccc98647976f,e868e8e8607050d0,4901002020000001,f2f2c3d59df4b026 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1439 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)