Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11E03A531909B253B033716D9B6A57B6EB0E7E39CCA034B0036FC57AD5FCAE50E925192 |
|
CONTENT
ssdeep
|
384:MzvqlBv33LBZnWS6Zmcr0uIaLe2gU+DQ8aY5ZKm9oIB+g9aBNfBNltA:MzcnWS6ZvwuIxZQcKywgWXltA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9a226197cec6cf91 |
|
VISUAL
aHash
|
00001c3c3c3c0000 |
|
VISUAL
dHash
|
4c9b396969715412 |
|
VISUAL
wHash
|
2c003c3c3ebebcda |
|
VISUAL
colorHash
|
00000000e00 |
|
VISUAL
cropResistant
|
d68bc9c7d6fa93d0,4c9b396969715412 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 39 techniques to evade detection by security scanners and make reverse engineering more difficult.