Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BEE275717120CC2261CF6AD9F926631080F7A71ACB8797E5F064A3F616ADC7DEA33059 |
|
CONTENT
ssdeep
|
384:EGt+1+fXXWxiONkjeZ8hpwHe5wjh4mr8hlbhknyFWJjU9zC5j2fqtY6g:7t+1IXXWxKIemrO4gCR2CtHg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9c0f6aaa222bb73a |
|
VISUAL
aHash
|
03181e331cfa98c6 |
|
VISUAL
dHash
|
87f236a2a8b2320c |
|
VISUAL
wHash
|
01191e731efabac6 |
|
VISUAL
colorHash
|
39201008040 |
|
VISUAL
cropResistant
|
87f236a2a8b2320c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 207 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)