Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1FA9201318149B12B533748C8E8721B1E70E39B5EDE230D469AFC57CBBFD5CA6AD0A449 |
|
CONTENT
ssdeep
|
384:CmRlRphvbgIZOwuFV9yHALaLYgiA8WlSonX7tl1R7f:7RlLhvbgIysSonX7tlz7f |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cb783083c7169e3d |
|
VISUAL
aHash
|
00003c3c3c3c0000 |
|
VISUAL
dHash
|
a99371696969a18f |
|
VISUAL
wHash
|
0058bcbcbcffc1c1 |
|
VISUAL
colorHash
|
06401008200 |
|
VISUAL
cropResistant
|
e5859da9a49418c8,a99371696969a18f |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1095 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)