Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10462A8F0A188141F3226D6C5DAA6AFCD6266C50AC706056AF6F5245FF7CEDF8C4B2360 |
|
CONTENT
ssdeep
|
384:QIKSiSX1MKg1DI+IrcaTuzwzvTeNUNk9Gs90s90s90D1li:QIKjuuKgFwrcaTowzvT6pAs6s6s6D1li |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b366cc328e339933 |
|
VISUAL
aHash
|
e7e7e7e7e7e7e7e7 |
|
VISUAL
dHash
|
4d4d4d4d4d4d4d4c |
|
VISUAL
wHash
|
2323272720202020 |
|
VISUAL
colorHash
|
060020001c0 |
|
VISUAL
cropResistant
|
4d4d4d4d4d4d4d4c,aa8e8e8e969aa6a6,96d237b2d201a2d0,1ecccac8c97dfcf8,ffffffffffffffff |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 6 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)