Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12CB15274818C9A37419792CAA7634F0B73C5C205CE8B6B0653FB83AE9FDBC85DC18246 |
|
CONTENT
ssdeep
|
96:4KKO0548a5o4tz04T3DAlCnu2200Er0P2yi4ha1G9dvaL4:4KbzztzVT3DAWu2d01P2Z4w1GLvS4 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ac0a9bb187cec6b8 |
|
VISUAL
aHash
|
ff000000c3c3dbff |
|
VISUAL
dHash
|
f071716d96969696 |
|
VISUAL
wHash
|
ff000000c3c3ffff |
|
VISUAL
colorHash
|
03000000180 |
|
VISUAL
cropResistant
|
2000c08036717172,71716d969696968e,2e39bbbae4c2e369,717131697171696d,4d9292cdb6c8924d,4d92b24cb2cc924c,020a070707030a00 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 65 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)