Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10A4266B30369C8236192C7EBA731F35A9297E241DD672B45AAE14B0F6BD7D81CC71318 |
|
CONTENT
ssdeep
|
96:GEXRWGSPSO2trPGr+g7lADOOGXcm+Ys/x+YsE+4nqnaGTUNffc1SsNy4NAvciHbd:dRRXqsUcfvqnaGUffdvVnOTCviwQ89 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b8c79c639c946939 |
|
VISUAL
aHash
|
ffffdfffc1c19f8f |
|
VISUAL
dHash
|
280c370c0b0b3634 |
|
VISUAL
wHash
|
e7e783c381818b8f |
|
VISUAL
colorHash
|
07002008080 |
|
VISUAL
cropResistant
|
280c370c0b0b3634,24e6d3d7c54756d6,8783615353656373,2626ded4d4b4e4e4 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 4 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)