Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B3233B766731B8A983DB51EEE7382D59B2C5589DE8CB4400F5C99A8D23C7C902287BB4 |
|
CONTENT
ssdeep
|
768:am+EsZx8/G8SdDVRtMjBWRfMjBRdFJnpRXPZlQaQD9695678WHBUkA+BrCPqDvrZ:am+EsZ/8gDVRtMjBWRfMjBDrpRXPZlQj |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
be67c3309398ce31 |
|
VISUAL
aHash
|
8381bd83839f83bf |
|
VISUAL
dHash
|
4d0f69371f311f79 |
|
VISUAL
wHash
|
87818783839f83bf |
|
VISUAL
colorHash
|
07007000000 |
|
VISUAL
cropResistant
|
4d0f69371f311f79 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 17 techniques to evade detection by security scanners and make reverse engineering more difficult.