Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T181243AC8E3A4B0F74C5E97EC1C725F4E83F68564C84C95CB74BF84552EB0A2D2D9A928 |
|
CONTENT
ssdeep
|
3072:6Y8uMBBQGWw3ItSSBQXe8nO+lzy8U7v+Vt5:6YUGgItSSD8LTUT+Vt5 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a870f0f8f0f0f0f8 |
|
VISUAL
aHash
|
c00000073fffffff |
|
VISUAL
dHash
|
1647b9cf2f3f1101 |
|
VISUAL
wHash
|
c00000070fdfffff |
|
VISUAL
colorHash
|
000000001c0 |
|
VISUAL
cropResistant
|
1647b9cf2f3f1101 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 7621 techniques to evade detection by security scanners and make reverse engineering more difficult.