Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10A039631549A243B033716D9B565BB5EB0E7E39CCA030B4037FC97AD8FCAE51E9251A2 |
|
CONTENT
ssdeep
|
384:Hzm/lBw3EYHZnmqtPyalU00ieXe2gU+DQ8aY5ZKm9/GDqlVSdaBNfBNlXA:HzJ1mqtPtz0ieuZQcKyhVS2XlXA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9a226193dec6cd93 |
|
VISUAL
aHash
|
00001c3c3c3c0400 |
|
VISUAL
dHash
|
4c9a296969714810 |
|
VISUAL
wHash
|
24083c3c3e3ebcde |
|
VISUAL
colorHash
|
00000000e00 |
|
VISUAL
cropResistant
|
d68bc9c7d6fa93d0,4c9a296969714810 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 44 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)