Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16EC271F181164873459B82E161781F6EB1F083C8F7831A966AFC83BC8BD9C95DF2B951 |
|
CONTENT
ssdeep
|
768:Y6uGFfx55KmD/e0A7Bgy3TG/BhZz2VL2+ePFBtLI+9CEu47VVRgPz4czL98qtxgr:Y6uGFfx55KQ/e0A7Bgy3TG/BhZz252+Q |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
89e9672337179cc8 |
|
VISUAL
aHash
|
e3db5a5a5a180000 |
|
VISUAL
dHash
|
8f96969696b24c4c |
|
VISUAL
wHash
|
e3ff7e7e5e180000 |
|
VISUAL
colorHash
|
38007000000 |
|
VISUAL
cropResistant
|
8f96969696b24c4c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 32 techniques to evade detection by security scanners and make reverse engineering more difficult.