Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17F244BB1D31463BD5A4E83DCA5346528351E10EEFD528E7CC2E98F84DA93EE49D84C8E |
|
CONTENT
ssdeep
|
1536:Gv/STV4EhB7D7xyNeq9eTuyQeP5lOC8W7taB1LPLRUl9VwAZlwcofQDq2rgR4aRA:Gv/jEhBf7qsQePqkButPowjz2EHC |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d252acad6d6d9292 |
|
VISUAL
aHash
|
80040400ffffffff |
|
VISUAL
dHash
|
0248c848322b2b4c |
|
VISUAL
wHash
|
00040400fcffffff |
|
VISUAL
colorHash
|
06000000e00 |
|
VISUAL
cropResistant
|
630248c80cc9c810,d8d4c0d0ccccccf0,009391a5b5808080,11ae8cdacaaeac00,014dcc8d9082a282,0032231b2b704c0c,0248488cc9c91000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 803 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)