Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B5336338A124AD3FC81782E4E1F1D75F31D4428EF61B02E2A2F6C7A95BDAD91DD39148 |
|
CONTENT
ssdeep
|
384:sJfjICU2hNBO+YYAuEUh5bUnmciEhWjMAEeZ0/E/he7o4Lo5/WeCdNWng:sF1N8YAufhVDcxOMwxeTpd0g |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c529b333a6b0a7b1 |
|
VISUAL
aHash
|
6238387878707e7e |
|
VISUAL
dHash
|
cef0f0f0c0c4d4e0 |
|
VISUAL
wHash
|
6238387878707e7e |
|
VISUAL
colorHash
|
38000000038 |
|
VISUAL
cropResistant
|
cef0f0f0c0c4d4e0 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 32 techniques to evade detection by security scanners and make reverse engineering more difficult.