Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T102A2947262497D7B0197C2C2AB31675FB2D1A18EDA439B02E2FA87890FC7EE0DD44745 |
|
CONTENT
ssdeep
|
384:8PaC/5mHG76OIj3ILR383VQgFzuKYTlXYjdEwzAcFoID44i6fBl31QVsOwb8UpEj:PY8GRMNzuKYTijBQ+fX31QOOwPiymrcS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cee134cbc5e93432 |
|
VISUAL
aHash
|
ffff00703c3c1800 |
|
VISUAL
dHash
|
645164c5496971cc |
|
VISUAL
wHash
|
ffff82f0bc181900 |
|
VISUAL
colorHash
|
02000000c00 |
|
VISUAL
cropResistant
|
645164c7c9697171,910646f1d6493bda,e7048ccaed6c7078,004080a0a0a00000,5164c749697171cc |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 5 techniques to evade detection by security scanners and make reverse engineering more difficult.