Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D202437D91483E174641C5A8BEFEB289A507CB9BCF92AE01E2DCD60D29C599CEC101FD |
|
CONTENT
ssdeep
|
96:pdg+WI+UyENUVnuRnu4CB4c7HVbaFur4uoTmkZBP/UgmdZXbqM0Gu:pdg+hDR6vHVbSur4uft7dZrqM0Gu |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cd65929acccc7931 |
|
VISUAL
aHash
|
12424232283c3c3c |
|
VISUAL
dHash
|
361616765a696161 |
|
VISUAL
wHash
|
0303033b0b3f3f3f |
|
VISUAL
colorHash
|
07002010080 |
|
VISUAL
cropResistant
|
361616765a696161 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 8 techniques to evade detection by security scanners and make reverse engineering more difficult.