Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15DB241724058AD3B529BC2D4E370AB2BF391C285CA274781A7F4C79D5FD3E89CD26918 |
|
CONTENT
ssdeep
|
384:iNxNxNaTWGitNENHNFLavSbGMIuyeXDrnDGPjch70dMh05acxigWJfhpcLhjj:s+XlztH+shp4jj |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
dc46e2ab39a5e489 |
|
VISUAL
aHash
|
ff10100000ffffff |
|
VISUAL
dHash
|
2565e4327a0c002a |
|
VISUAL
wHash
|
ff00000000ffffff |
|
VISUAL
colorHash
|
0fe00040000 |
|
VISUAL
cropResistant
|
3a252564e4365afa,4c28a9dab8a84c19,365a3a3a08322a2a,a52564e4365aba3a |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 937 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)