Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1FFD12EB29008A93752A3C3EDB7B1A34FBB82C585C987064A90F6D31E1FD3DA0DC13656 |
|
CONTENT
ssdeep
|
96:ikyXUXWXnRX3HUnoGyPs44mGjZzmQK4yYeyqq0w2mzClPhUbTuGWVBrGobuMckM0:ikEOQxXnFbORVpcTBrpM0 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fe7e78a161605c94 |
|
VISUAL
aHash
|
80808080ffffffff |
|
VISUAL
dHash
|
2038340330202024 |
|
VISUAL
wHash
|
80808080f3f3fff7 |
|
VISUAL
colorHash
|
070020001c0 |
|
VISUAL
cropResistant
|
2038340330202024 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 11 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)