Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11CA2E973928026375A2302C9E775E79DD34384FCDB420A85D1E8923D93D4FE2E972AD9 |
|
CONTENT
ssdeep
|
384:xOHgJU2IXQPLNWUDXMSZ9BXPj8ju+wPhkwCs:gHgJWQPLhX/nBfBVpD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b135ce4f33322a39 |
|
VISUAL
aHash
|
00fec7c7c7ffffff |
|
VISUAL
dHash
|
6c609d9d9d944cdd |
|
VISUAL
wHash
|
009cc1c1c3c7e7e7 |
|
VISUAL
colorHash
|
070060000c0 |
|
VISUAL
cropResistant
|
0140347171b30000,689c9d9c9d445cdd,0000004040000000,eff7e7e7e7c7c6c6 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 45 techniques to evade detection by security scanners and make reverse engineering more difficult.