Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1FDC233F2BAC36819305F55CFD10B260C51D0EFCEC65179D999F49232AAB6CE0B7D22A4 |
|
CONTENT
ssdeep
|
384:+wXyEKcwEcS9eQ/lrKdoEDH+9NTfwaAmEB/5:Xr4xHq9N1AmE5 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f887686e9847e49a |
|
VISUAL
aHash
|
c0c0cedeccc0c0cc |
|
VISUAL
dHash
|
10181c9898069414 |
|
VISUAL
wHash
|
c8c0dededec0c0dc |
|
VISUAL
colorHash
|
0f401000002 |
|
VISUAL
cropResistant
|
024e0e36823a3200,cece94909a9a9c14,5c9ec283d586f263,ea2ac4aa2baa322a,490c0e0c8f828c8c,e0f0e87071856569 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1043 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)