Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T153644CDBE2758A36E65683CCDAE73329707F408FD64A0944F2A48FB8B059CD87917D84 |
|
CONTENT
ssdeep
|
1536:EKhHDH9HZ9TIx9Qw1LneaSTMcw3xFHpI3iYhHl4cQQD5xgIyzG+WpPjq0mAAfoY5:Ej2rh7vCSQ9MvaxT0pMWBFmv |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
da254a3d255a2d5b |
|
VISUAL
aHash
|
00f8f8fc0e1cf8fc |
|
VISUAL
dHash
|
220000406830e9c9 |
|
VISUAL
wHash
|
00f8f8fc061cf8fc |
|
VISUAL
colorHash
|
060001c0010 |
|
VISUAL
cropResistant
|
000000407c30c9c9,0cb3b10202a2a202,8b8b3149a1f19317 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 133 techniques to evade detection by security scanners and make reverse engineering more difficult.