Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11143BF70A099AE6761E385CCA7669F0F27C08284C6631F566BFCC30EABDFE14DD16494 |
|
CONTENT
ssdeep
|
768:BQKKBdUqY0bQ6TYo5SYVvOpDiAnmlqbxMHMQ8/uit1EGNO7RyfazeVPkLr1Z:oRXFtfvOpGAnmlWM78/v1vOVyf1tkP |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c34bb4b4cd9cb4a4 |
|
VISUAL
aHash
|
ff20383838e7ffff |
|
VISUAL
dHash
|
69c8d0e1c90e3349 |
|
VISUAL
wHash
|
3c20383820c3ffff |
|
VISUAL
colorHash
|
06003000080 |
|
VISUAL
cropResistant
|
69c8d0e1c90e3349,2189899989949790,c3b763d0981e1bec,1669691eb2b24c00,595b5a555b414d45 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 26 techniques to evade detection by security scanners and make reverse engineering more difficult.