Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13E51597690869AB34583E2E09B76260BF7D1C20ACE6B070153EC838E6FD7EA4DD17514 |
|
CONTENT
ssdeep
|
48:pSA6s5jOl5VhI+LXw5VhVSLXq5Vh9Lo3ySTFxm:UAchI+ihVSEh94JE |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b092676c66399b93 |
|
VISUAL
aHash
|
c3c3c7c3e7c3c3e3 |
|
VISUAL
dHash
|
8e969e968e96968e |
|
VISUAL
wHash
|
c3c3c3c3c3c3c3c3 |
|
VISUAL
colorHash
|
0f600010000 |
|
VISUAL
cropResistant
|
0000000000000000,f4f4f474f43434b4,8c242c2544ccc0c6,a20655555555b2b2,d0878ea78868e4f4,06b36e6b83e8f016 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 79 techniques to evade detection by security scanners and make reverse engineering more difficult.