Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14C81234052884E3FA1634394E3FAB73931A68152D70B250885F8537DABD9D4BED376EC |
|
CONTENT
ssdeep
|
48:TprKAqT8XNkwF3u+9e6mW0qWgSxlFMpHxYWkUYTH82M4IrxqxzIuFrq:T1cIX3Fe+YS1WgSOQRlKryY |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
89563768066b7f31 |
|
VISUAL
aHash
|
00ffbf797b19090f |
|
VISUAL
dHash
|
3c7a73f3f3b3535b |
|
VISUAL
wHash
|
00bf3f797919090f |
|
VISUAL
colorHash
|
062000001c0 |
|
VISUAL
cropResistant
|
fb7af3f3f3b3535b,00a2292c262d2200,28566969569091e2,8f172e1e7e5efbf3,a2e011909061a280,a207797986696917,5d2d19171eb7834b,4bb4b40b91a8a855 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.
| ID | Portuguese | English | Trigger |
|---|---|---|---|