Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14963B037B2416D2701A393D8EAA25BAB1311C74CCE0A0F49569CC27BADFF974DC1617A |
|
CONTENT
ssdeep
|
1536:hvS5QdPon+4Dr9Gvbx8FCHjiwPx3L39Iy0vs7Zbzuh03kW:hvSiPozupiM3zV0ESlW |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cbd33c33762c5530 |
|
VISUAL
aHash
|
283c3c3c3c3c0101 |
|
VISUAL
dHash
|
c9c9e9e1c9c9b37b |
|
VISUAL
wHash
|
3c7c7c7c7c7c0301 |
|
VISUAL
colorHash
|
07000000183 |
|
VISUAL
cropResistant
|
9b9b96c4c3139b92,b28a86d6aa2a9696,c9c9e9e1c9c9b37b,4439d8dc346aa8a8,dc9849181a0a1a0a |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 33 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)