Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E9D35079F1708D3B92AE32D4E7086BD1A04753A3C6C5DFE1B1DD81286B86AC4A33395D |
|
CONTENT
ssdeep
|
768:BxFNwyd7kSZCp8qiJt0ukktNtFg5gK8zW8qOOvV7CIbB6PEK9PAuPMpg4buBT51r:VdD2R3y333nSXB0T49E |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e2ac93d6ca8a5536 |
|
VISUAL
aHash
|
ffff000100000000 |
|
VISUAL
dHash
|
413783c789c8cddd |
|
VISUAL
wHash
|
ffff03014060e0ef |
|
VISUAL
colorHash
|
16001c00000 |
|
VISUAL
cropResistant
|
6075348659596002,1787c78188c8cddd |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 7 techniques to evade detection by security scanners and make reverse engineering more difficult.