Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DCA2AC72C04114AF1936DC93FB75BB66D0C3E32E8A31D41096648E5EEED6EE0536249B |
|
CONTENT
ssdeep
|
192:svSUut0MRJ4jSL7chyte4JirHTVOMwYdUKmmMJh7tb2ZStIvqKxf+LVdCrGRVt2R:3kKfVu+qNGlKCAA5+z721/rk |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e6196666cccccc66 |
|
VISUAL
aHash
|
e7e7ffe7e7e7e7e7 |
|
VISUAL
dHash
|
cc4d180c4d4d4d45 |
|
VISUAL
wHash
|
42c3c3c3e7c3c3c3 |
|
VISUAL
colorHash
|
07001030000 |
|
VISUAL
cropResistant
|
cc4d180c4d4d4d45,41c1a319cdcd1d39,2f1d7cfc7c7cfcfc |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 96 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)