Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15B0273B626025C7F9683C2E0FBA1772C96ACC6C5E527455DF1E8416A3F86E16C8872E0 |
|
CONTENT
ssdeep
|
192:WBZjRMkZ+nhiOA+vxOPwx6xOc35y66xOMizKCCRp8YNs:WHjRMk8f3+351/WCCr8YNs |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b4c32c1acf863bcc |
|
VISUAL
aHash
|
ffe7e7e7ffc3c3c3 |
|
VISUAL
dHash
|
610e0f4d1b0f1716 |
|
VISUAL
wHash
|
bdc3e7e7c3818181 |
|
VISUAL
colorHash
|
06c02000000 |
|
VISUAL
cropResistant
|
610e0f4d1b0f1716,8e4f171393b13382 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 23 techniques to evade detection by security scanners and make reverse engineering more difficult.