Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16A62D873E200D92A8A8FA7C9F9C0B94C101ED355E6318DC665A451FBBBD1CF87A6538C |
|
CONTENT
ssdeep
|
192:43E2hR4de3iFQSSx2xBMcnthWeNWbnfMmUU8VCoGtlq27xYODyOvLZtoiEGzttKy:46e3iF6fMmUFCoOwM3nb |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a525da2531da25db |
|
VISUAL
aHash
|
030303030303ffff |
|
VISUAL
dHash
|
d6e6e6e6c6c60a00 |
|
VISUAL
wHash
|
070723030307ffff |
|
VISUAL
colorHash
|
16007000000 |
|
VISUAL
cropResistant
|
d6e6e6e6c6c60a00,ecd4f0f0f0c0e0e0 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 10 techniques to evade detection by security scanners and make reverse engineering more difficult.