Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F5B1C67BF35826F72E1204E0795A23D9DBAF126C52B1CA9D70B0409C63FDE4781B11E5 |
|
CONTENT
ssdeep
|
96:DIKq5PN4A/YcPtcZtczc7cjTQK+Cts0d+B0UykKGMbaJM7d6Lpzs/R7DmnQdv:0jPOAQU8t40yx+LBO/rgMwwR71 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3cfc13989c93147 |
|
VISUAL
aHash
|
fbe7e7878787e7c3 |
|
VISUAL
dHash
|
f30fcf1f0f1f8c8e |
|
VISUAL
wHash
|
79c3e3838387c3c3 |
|
VISUAL
colorHash
|
07006000240 |
|
VISUAL
cropResistant
|
f30fcf1f0f1f8c8e |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.