Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T116F22BF563A4A6B9B101C3E4D732563A739751FADE838310C3ED9B8C89D9C8EDC99841 |
|
CONTENT
ssdeep
|
768:RthXTRlXND9bVbv9OpTTRVPYMOXTFsKtbxp:9RFVr9OpvXYMOXTFsKtbxp |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9313c476cbe824ed |
|
VISUAL
aHash
|
ff0402090706ffff |
|
VISUAL
dHash
|
a958da5b182c8cc0 |
|
VISUAL
wHash
|
ff0402080706ffff |
|
VISUAL
colorHash
|
1a2000c0002 |
|
VISUAL
cropResistant
|
b0b409291858585c,b0b0787871b38384,008080c0d0d0c0e6,8080c0c08064e2e0,29585adb5a5b3c2c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 280 techniques to evade detection by security scanners and make reverse engineering more difficult.