Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14C71857852D107B71103C9D0F6DAFB2AD9E5CB58DA23584BE2FCC2CB0685C68DD46361 |
|
CONTENT
ssdeep
|
48:t2TtaaR8cC9AhiQ+ouOwKSwLaOSHyNT9Zb9NuNP5WfjhqbPQLjqS1:t2Twb9ACBwLaODNht9NuNP5khqb6OS1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a84bf318d933f60c |
|
VISUAL
aHash
|
000101031b0707ff |
|
VISUAL
dHash
|
fffff7b7b3cfff5f |
|
VISUAL
wHash
|
0103071f1f071fff |
|
VISUAL
colorHash
|
00000000030 |
|
VISUAL
cropResistant
|
aaa2a2b2b2aaa2be,ffff7f7a4f4d5e6e,fffff757b3b7cfff |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 6 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)