Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19814F812E120693B7827A1DFE550719A33D8B9C6C363859493EC03648AF7E7C9ED2D4E |
|
CONTENT
ssdeep
|
1536:7h0rWISSPn1WmxNGnbIAVQnjmReJc+jRGRL+9m9RKRvsmajRgJJRP9pXJVJSP9me:/T/betAOz0VTVD |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fb94723a423c731a |
|
VISUAL
aHash
|
fffffffb81818181 |
|
VISUAL
dHash
|
2d4003b21b1f1f0f |
|
VISUAL
wHash
|
84ffffdb81818181 |
|
VISUAL
colorHash
|
07600000003 |
|
VISUAL
cropResistant
|
2d4003b21b1f1f0f,446436323232325b,2424363636362621,715c5e754b52652f,9c9f9b9bbb1b1a92,71736f4c6c777b79 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 108 techniques to evade detection by security scanners and make reverse engineering more difficult.