Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A7D16473445809120247B6D5F7613B97D0A3C26FCE97494E50F79328B9F6CB2DC8AA72 |
|
CONTENT
ssdeep
|
96:juoTqS8SMLSaN2KXQw9iYXjF51mhPY9MIC35H3WhG+3WDLz:reSDMLSasKXQ9YXXiz1GhG+GDLz |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c4843b496b3eb43e |
|
VISUAL
aHash
|
707e7e7e7e7e0000 |
|
VISUAL
dHash
|
a0e6ece4c2828031 |
|
VISUAL
wHash
|
307e7e7e7e7e0000 |
|
VISUAL
colorHash
|
18001000180 |
|
VISUAL
cropResistant
|
3cf87cf8f8f0f070,a0a280e2eaa280a2,828082e2e282a0a2,0202100c4c080002,a0e6ece4c2828031 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.