Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1AF319EE320497537231B52DA0D42B240B3D3D0A6C6991A471CE965AFA7E3E68AE1D30F |
|
CONTENT
ssdeep
|
48:39qZ1pawvprFAZUAZ/AZgAZNAZqGAZzAZzS:3kR9FAiABASAXApAFAI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a7f1483e5df0c883 |
|
VISUAL
aHash
|
6066ffffaf070000 |
|
VISUAL
dHash
|
cccccc8c4e2f4de0 |
|
VISUAL
wHash
|
60e6ffffaf070000 |
|
VISUAL
colorHash
|
070030c0000 |
|
VISUAL
cropResistant
|
ecccfefefcd1341e,8080808898989cdb,b1f1e1efefffffff,cccccc8c4e2f4de0 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 6 techniques to evade detection by security scanners and make reverse engineering more difficult.