Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DC4253E54524D4360552CF98E1F13B49E6E2E956F283ED3212E14B2F92CACB7F91C229 |
|
CONTENT
ssdeep
|
96:msqUrmy2cmq4YSikS2vJS+JSZvJSaHScCCiZZhSfNEkQlEngNE2pS/mTA7SQ9SUX:etNHy2kRZkDc0Qfegngej/mTv3UIp0x |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b332cc4cce33319b |
|
VISUAL
aHash
|
42e7c7c7ffc3e7ff |
|
VISUAL
dHash
|
8e8e9d9d5256565a |
|
VISUAL
wHash
|
000204002b0323eb |
|
VISUAL
colorHash
|
07000030010 |
|
VISUAL
cropResistant
|
8e0e9d9d5256565a,060e1f1f1f5f1bc7,7f656d95a56d67ef,3633616969712b26 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.