Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11B5113E7D424F1BA929052FC7DD6708C81AF040DA39066D4B7E4A07E52F9E90A5F32B6 |
|
CONTENT
ssdeep
|
48:ThbZGtTZTPjyQ+u/JnB2kfZcn4tngn61na:Th8TPjyQ/xB2L4tg4a |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a7369c0d27343d27 |
|
VISUAL
aHash
|
03e7a72727ffffff |
|
VISUAL
dHash
|
164e4e4c4f330002 |
|
VISUAL
wHash
|
0383030307c3ffff |
|
VISUAL
colorHash
|
07000000038 |
|
VISUAL
cropResistant
|
164e4e4c4f330002,0140bb456739c001,d0e4a6a678f96829 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.