Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BDA3F8B57250AD37409383E0BF74576F72E282A9C90A11554BF067A92BFECA1FC4734A |
|
CONTENT
ssdeep
|
1536:JeneweseRe7ej+1A9K6jGPcqON6FN6dtpmL7HVsWAwkMjoBMAwkMFgAwkMJVgaFB:hWFSzeotVkxch |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bec9c93232c1cd36 |
|
VISUAL
aHash
|
ffffbf878787ffff |
|
VISUAL
dHash
|
3139602d2d2d202c |
|
VISUAL
wHash
|
0d899f8787878787 |
|
VISUAL
colorHash
|
07209008200 |
|
VISUAL
cropResistant
|
3139602d2d2d202c,15c57931e3d9e1ad,37667c795c9cc271,736569715c5a4779,3731759dd95a4d69,37667c79455c4a69 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 17 techniques to evade detection by security scanners and make reverse engineering more difficult.