Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18B32D75AEFB8527FBAD385DFB260BB9D71C6449BC2535A84B0F841A1C382F54CD18272 |
|
CONTENT
ssdeep
|
192:MCSp+K0kKnh0hZwB4Du9tBqiuzIal1juTdS/k0l0HvTdG2B0F8:MCDNkSuZwZSdlevxG2B0F8 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b226dc9998667699 |
|
VISUAL
aHash
|
ffc3e7e7ffc7c3ff |
|
VISUAL
dHash
|
2b8ecccd98cc0e32 |
|
VISUAL
wHash
|
df0302434347c3ff |
|
VISUAL
colorHash
|
07c00008040 |
|
VISUAL
cropResistant
|
2b8ecccd98cc0e32 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 29 techniques to evade detection by security scanners and make reverse engineering more difficult.