Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11382BD337088862E4E8B51ECEE98B366A28D9149F771C48269F5827F9B41DDC783436D |
|
CONTENT
ssdeep
|
384:2RObUtrcwnJKu2FIJZ+8j9jbDix65owASpzxP+SbKjExFDVRVSGwsH2FAcfMmUF7:2ftrcwnJKu2FI/+8jFbDis5ZASpz1+Sp |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b869c1847d799696 |
|
VISUAL
aHash
|
81818181c3ffffff |
|
VISUAL
dHash
|
330f0f1b27203f38 |
|
VISUAL
wHash
|
8181818181ffdfdf |
|
VISUAL
colorHash
|
17e00008000 |
|
VISUAL
cropResistant
|
330f0f1b27203f38,6911898a9a9a9a5a |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 10 techniques to evade detection by security scanners and make reverse engineering more difficult.