Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B891B52292009D6384A3C5E8F6E7B61BB280C304D2434905B7F9B36D5FDBD85DEA1662 |
|
CONTENT
ssdeep
|
48:Gu6PpOjHgRwOzjH9NkaEfvN1+J2RGOTVNn0KpWK6YnNQOVBSo5MeYoRnND2e6kFg:GusMjHsnjHAOwVxx6mBS3eYltxvo8D |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b44b4163433d4d77 |
|
VISUAL
aHash
|
00ffdf87a7838387 |
|
VISUAL
dHash
|
882c362e2e262626 |
|
VISUAL
wHash
|
00ff9f8b87838387 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
882c362e2c262626,00004040404085ca |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 7 techniques to evade detection by security scanners and make reverse engineering more difficult.
| ID | Portuguese | English | Trigger |
|---|---|---|---|