Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T146E25031A801AA3702A3A3D2AFB5E70F33D1D641D9578A95A3F9C38D4FDBD80DE21615 |
|
CONTENT
ssdeep
|
768:oQOBS2tdO96Qz9sFi96SPQsjm96bOCsL90OJO63MHn96pasVP964As3HleIOyU0z:dqS2th0Nj9U2Ir |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
922e671f2c363c17 |
|
VISUAL
aHash
|
00ff8e8e8e8eee04 |
|
VISUAL
dHash
|
bd183c3c3c385818 |
|
VISUAL
wHash
|
00ffde8e8e8eee00 |
|
VISUAL
colorHash
|
060400001c0 |
|
VISUAL
cropResistant
|
bd183c3c3c385818,ffdfdfffdfffffff |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 16 techniques to evade detection by security scanners and make reverse engineering more difficult.