Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T114A20EE0D451ED3A031391D5E7B2AB5B72D1C349CF130A54A3F853EAA7CACA09A168DD |
|
CONTENT
ssdeep
|
384:Ozn9F6bbYbkhic1lOgceqnPtvevTsoqe70U6sYjZKZdZ0ZUhhia8F:pbbYbFc1lQeqnVverRV7Z6sYjZKZdZ0X |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
833c2866dbc2dd99 |
|
VISUAL
aHash
|
00003e7e2f677f7f |
|
VISUAL
dHash
|
6e7eecccdccccdf9 |
|
VISUAL
wHash
|
00003e26277f7f3f |
|
VISUAL
colorHash
|
02002000180 |
|
VISUAL
cropResistant
|
ee7eccccd4cdcdf1,6eee3eecccccdccd,3149d56e0eb3e7c4,c1f8fc1c1ebffcdb,cd4d312141431315 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 60 techniques to evade detection by security scanners and make reverse engineering more difficult.