Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T197F112E1C144DC3A535285E6F7F52B1F7596C349CB020A8863FC52EB5BDAC60CA23A99 |
|
CONTENT
ssdeep
|
96:TkwDP7mohOhHWfeGnVpTv8IVpTvdgfwvFge5XWHFVeFXGHk5pVX5z/u7kDiQPJ:QwD7mohOhHW1nHT0IHTVVgi4UDz2QR |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
beae6fc2c2c8c2d0 |
|
VISUAL
aHash
|
fd83dfffffff0000 |
|
VISUAL
dHash
|
6927363128091000 |
|
VISUAL
wHash
|
b583dfdfcfc50000 |
|
VISUAL
colorHash
|
07040007000 |
|
VISUAL
cropResistant
|
6927363128091000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 64 techniques to evade detection by security scanners and make reverse engineering more difficult.