Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D1336C726731B9A883DB52EEE7382D49B2C6549DE8CB4550F1C996CD23C7CD02287BB4 |
|
CONTENT
ssdeep
|
1536:a2+EsZ/8DgDVRxMjBJRgMjBarpRXPZlQaQD9OehM+BrUgq4FJ:aDjR0RArpR/PkEeDFJ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bf1ec0d269c4d392 |
|
VISUAL
aHash
|
9f0f0f83018ffffb |
|
VISUAL
dHash
|
797b7d531f1d2613 |
|
VISUAL
wHash
|
9f030f010185fffb |
|
VISUAL
colorHash
|
06c00018000 |
|
VISUAL
cropResistant
|
797b7d531f1d2613,fcfe56925b9a1c99,73e3e1f9fcfeff2f,8e4e8a39594a4e8e,faf1fdfdd3dbbebc |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 17 techniques to evade detection by security scanners and make reverse engineering more difficult.