Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18B427233A600CD2A4D9B558CF1C0958C525ED34AFB3108CAB160A1BF7BC9DF169B93AD |
|
CONTENT
ssdeep
|
192:vm/Yc5cvchhQQUfvCvmOwxKYMcnthWeNWbri2qfMmUU8VCoSV:vmAc5cvchhQtfvCXbi2qfMmUFCo0 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f3605c6676585c72 |
|
VISUAL
aHash
|
00ffffefe7ffffff |
|
VISUAL
dHash
|
a2cc0c4c4d0c0800 |
|
VISUAL
wHash
|
00e4e4e4e0e0f0f0 |
|
VISUAL
colorHash
|
07000038000 |
|
VISUAL
cropResistant
|
ca0c0c4c0c0c0000,2020a0a0400010ca |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 10 techniques to evade detection by security scanners and make reverse engineering more difficult.