Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A6B233324448AD3B119BD2E0A371AB1BF381C246CB578791B3F4879C6FE7E96CD66118 |
|
CONTENT
ssdeep
|
384:SNBNFNOjyGitNkNbNFLi+SbGXIudPPp4nlFDidF7kw/hT5gay5+JecYhLCjv:AeXDUs59GcYojv |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
dc46e2ab39a5e489 |
|
VISUAL
aHash
|
ff10100000ffffff |
|
VISUAL
dHash
|
2565e4327a0c002a |
|
VISUAL
wHash
|
ff00000000ffffff |
|
VISUAL
colorHash
|
0fe00040000 |
|
VISUAL
cropResistant
|
3a252564e4365afa,4c28a9dab8a84c19,365a3a3a08322a2a,a52564e4365aba3a |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 937 techniques to evade detection by security scanners and make reverse engineering more difficult.