Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T184F394707D10143A50AFA3CA9E668B1D33C1E384CF4119D453F4D76EEAABD84F9E21A9 |
|
CONTENT
ssdeep
|
1536:qVXiTRgxnzVJ3IDjFp+z+sybS3R6o7O3FpIUUtmluUh3xiuMswBC+CkT2hrN+HdQ:qVF6jRsynDxKROiiyCFiW |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e9969669926b349c |
|
VISUAL
aHash
|
efff8181818181ff |
|
VISUAL
dHash
|
1f0b131b13133300 |
|
VISUAL
wHash
|
e7ff8181818181ff |
|
VISUAL
colorHash
|
07602008000 |
|
VISUAL
cropResistant
|
1f0b131b13133300,b8d8572dc545ced2,f0f0c03036b6b638,ede9c94bd1243435,b3b3b03032333369 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 10 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)