Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E033753413682D7E602B8BE8F3A1F768529DC255E95BCAACA3BC136157C7C80ED235D4 |
|
CONTENT
ssdeep
|
1536:/bmivst6Hc5WZc+rEH9S8n93LAPrLXrhk9f0PvDb9nWd:e |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
be5b41c1151f564b |
|
VISUAL
aHash
|
00818181ffffd383 |
|
VISUAL
dHash
|
7333292f2b3b1707 |
|
VISUAL
wHash
|
00818181fffffb83 |
|
VISUAL
colorHash
|
070000100c0 |
|
VISUAL
cropResistant
|
a28082c2d2c280a2,33292f2b23331727,6062e0e0631fe4e4,4080909040488830,4000909040888830,0333256cac94919b,cecbcb9b9919899f,716c6c6f23733372,0f331919377b3973,4187879171b3f137,5b4a48485a505898,18228a9373d37307 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 89 techniques to evade detection by security scanners and make reverse engineering more difficult.