Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13B91813F851CAA580FA044B47E2022EF938E114EF3835ECB7DE1D17D53AEA5545B25CA |
|
CONTENT
ssdeep
|
96:SKnTPYw/zOlbUt8UO8yMacWIoymEooh13oR:SKnTPYwbsUt8UGWqP |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a425d9d8ccee5383 |
|
VISUAL
aHash
|
c3030383e7ffffff |
|
VISUAL
dHash
|
96164e2626d90010 |
|
VISUAL
wHash
|
43030383070bffff |
|
VISUAL
colorHash
|
06038000000 |
|
VISUAL
cropResistant
|
96164e2626d90010 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.