Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F462B7143040A67B0E2789ADF6E4F94AF14EE21CCA79B597F6D8023522F7DD1DD22898 |
|
CONTENT
ssdeep
|
192:Fu4kO/FVF90Qv3xhG0l2t2gxCaMiS2tTuxdxIZ/noo8kSRxd61S/XM6+NnXT8:kOtGvHZN/mj61SPM6+NQ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cccc3399993366cc |
|
VISUAL
aHash
|
0018181818180000 |
|
VISUAL
dHash
|
08323232b2323030 |
|
VISUAL
wHash
|
00181c1c1c1c1818 |
|
VISUAL
colorHash
|
38000000e00 |
|
VISUAL
cropResistant
|
828a928ccc8a9282,08323232b2323030 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 26 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)