Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T175230A31D8C4232706A313C17793A2479694D181B617CA8BDAFF834E52CEE95D73EB29 |
|
CONTENT
ssdeep
|
768:Z44fc05kqfZnJ/+DkzQPVkhU7xaxlOBlyCoqtUD1g817RferOZFnHFhQgwJes57W:Z44gqYkKeO3Q1xD2YtLwJRlO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9392966d6c719b92 |
|
VISUAL
aHash
|
462e6e003060603c |
|
VISUAL
dHash
|
ccccc8c2e4c0dcf0 |
|
VISUAL
wHash
|
667e7e307070607e |
|
VISUAL
colorHash
|
30010408000 |
|
VISUAL
cropResistant
|
33317970b2949696,ccccc8c2e4c0dcf0 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.