Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E3748623A165C9225CCBA1DCF6D4970C15888389EB32C5EE76E8A3FF46C8DE059553EC |
|
CONTENT
ssdeep
|
768:UcVcRcIp2D38kWvzcWOkdibpUr8fNq5oDHs0Wn5PWJIeG10DExz9OpFzlApaz3lR:v18d8z08ltlClHlzlqRkOQQXP0O |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
dc726230cc6cd6d3 |
|
VISUAL
aHash
|
00003c183c2e0018 |
|
VISUAL
dHash
|
a4586930f0cc1070 |
|
VISUAL
wHash
|
7e003c3c7e7e183c |
|
VISUAL
colorHash
|
38190001000 |
|
VISUAL
cropResistant
|
a4586930f0cc1070 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 17 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)