Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T105816130D0109D2BA242D094E6F1EA477346938693061A2877F5963FFACEF68CC655DD |
|
CONTENT
ssdeep
|
48:T7Peoku4tzfLT0Fk3Xmz4GyiThSEuUvmh6l7HxCAuIGrU:TDpMtDMFkXEvhTuUdV7uIGrU |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8d897227668d58dd |
|
VISUAL
aHash
|
6018183c10261a00 |
|
VISUAL
dHash
|
8ab2b2b2e0ccb2b4 |
|
VISUAL
wHash
|
7a7a187e367e1e00 |
|
VISUAL
colorHash
|
06000018080 |
|
VISUAL
cropResistant
|
92f0629abab88392,8ab2b2b2e0ccb2b4 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 6 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)