Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T192D133F1E048DD37435385E5A7FA6B4BB6A1C345CE03064493F8839B4FDAD60CE16A9A |
|
CONTENT
ssdeep
|
96:TkMKnfzDJ1tkUctbt8v67MNdMwvFqA2eGXboFR6DFXgz/m/7xG9a2iNAAC1d:QMKnfzDJ1bctbt8iI/EGgozcGoqrL |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b6b61c8c27a7a61c |
|
VISUAL
aHash
|
ffffffffffff0000 |
|
VISUAL
dHash
|
28300c0c10000000 |
|
VISUAL
wHash
|
9cccc0e000000000 |
|
VISUAL
colorHash
|
07007000000 |
|
VISUAL
cropResistant
|
2038300c0c000000,0000000000000000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 59 techniques to evade detection by security scanners and make reverse engineering more difficult.