Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D6526131A051B53740D783F2AB302BAABBE0C297D693464599F8C35C5BD1D62DC2F62B |
|
CONTENT
ssdeep
|
192:s1ZyLQx9Rj5sMiDM6Mc+TfyKTpfT4I40STp2MnlKHl3xpq/+1qp31qPaWI:s6LEnP6McWa6trZyDnsFBpaUk0XI |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec6c9393cb693161 |
|
VISUAL
aHash
|
fff3c191f9ffe7ef |
|
VISUAL
dHash
|
3b262723230c861e |
|
VISUAL
wHash
|
fde38181f1ff0103 |
|
VISUAL
colorHash
|
07400080041 |
|
VISUAL
cropResistant
|
3b262723230c861e,3f3767e3f2a22c34 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 492 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)