Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11DE3863491008E3ED583C3D5E735F62FF386C689CB275616A2F9839E8ED2D96CC92245 |
|
CONTENT
ssdeep
|
1536:bbFx/vbTxFtbTxFtbTxFtbTxFtbTxFtbTxFtbTxFtbTxFtbTxFZ:3fzHtHtHtHtHtHtHtHtHZ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9b65669a64929c9e |
|
VISUAL
aHash
|
04003c3c1c1c0c0c |
|
VISUAL
dHash
|
ccd358d8f8383938 |
|
VISUAL
wHash
|
26503e7e1e1e1e1e |
|
VISUAL
colorHash
|
30600210000 |
|
VISUAL
cropResistant
|
3832f3586c5c9e9e,ccd358d8f8383938 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 9519 techniques to evade detection by security scanners and make reverse engineering more difficult.