Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11CA296303211597F52C787B1F721BF2AA399D389C92B466CA2FCC2766FC5CA5CC49260 |
|
CONTENT
ssdeep
|
192:bsySOGW44tTXIb2S3cvxAQLdV9yG+J+75uzy/I24t/ywiNVFVgnwnFnJlpvcbLv:YOGW44VIJt+7E+/zkywsXxFA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ce73314c939bcc31 |
|
VISUAL
aHash
|
80e0e03c1838003e |
|
VISUAL
dHash
|
118c406960264e6d |
|
VISUAL
wHash
|
f0e0f0fc3c38033f |
|
VISUAL
colorHash
|
38001000c00 |
|
VISUAL
cropResistant
|
a2a0801b199080b2,118c406960264e6d |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 15 techniques to evade detection by security scanners and make reverse engineering more difficult.