Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14FF1577190015A3B51C3A2E5A731077FF3D1C246CD536B2A5AF9C39E8FDAE4ACE66204 |
|
CONTENT
ssdeep
|
96:TM2AQg9nEq4ch8LfUZGj3gtBgBU6yr7hhNN5jbCh61:Z09Eq4UO84+6e6g7N5j3 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
857ac13ec994eba4 |
|
VISUAL
aHash
|
5a00001800007e7e |
|
VISUAL
dHash
|
b294f0b0b4dcd4c8 |
|
VISUAL
wHash
|
ff001838107e7e7e |
|
VISUAL
colorHash
|
39001000180 |
|
VISUAL
cropResistant
|
00000c3034300c10,129216b5c9c9edd9,b2d4f8b0f4dcd4c8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 724 techniques to evade detection by security scanners and make reverse engineering more difficult.