Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1EB72D9725168DD7F61E3C2E8E3B56A2F33E69286CA47031187F9836D1ED2D85ED1B090 |
|
CONTENT
ssdeep
|
192:BGRb3/l3DCjz6tDGxOHPwIHs24UWITIljPFw9812ZjCmkkrvUN7:ob3d+jzsP1sayh9u8Qj1kGM7 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
99192666c9d999b9 |
|
VISUAL
aHash
|
0000181818180000 |
|
VISUAL
dHash
|
73ccb2b2b2b24c30 |
|
VISUAL
wHash
|
0100181f3f1f7bf3 |
|
VISUAL
colorHash
|
00000c00010 |
|
VISUAL
cropResistant
|
dad8c466c6e67121,73ccb2b2b2b24c30 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1 techniques to evade detection by security scanners and make reverse engineering more difficult.