Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15A91ED35380C5D1B9FB3AB8466C5A9043547E707818A84C093A966FF5AF7FB25B20C27 |
|
CONTENT
ssdeep
|
48:SkQH3MRsRkRwRlR/RVRfc+OhQ+Ox+OqdVa0vFu9SHhJC5jyn62EwscCQl8MHS1Vg:Y6pBJwjqrgPOlBak |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9898676664369bcb |
|
VISUAL
aHash
|
00183c3c3c3c1800 |
|
VISUAL
dHash
|
863171317171710e |
|
VISUAL
wHash
|
003c3c3c3c3c3c00 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
f030b0f0e0a07171,863171317171710e |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 16 techniques to evade detection by security scanners and make reverse engineering more difficult.
| ID | Portuguese | English | Trigger |
|---|---|---|---|
Pages with identical visual appearance (based on perceptual hash)