Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14534E033421975260177C2D420B99B3BE2A6DE4FFA930B014FECD7FA2BE9CA07456159 |
|
CONTENT
ssdeep
|
1536:RylcRqyYhTIXSMcrJsa0dKXWgvxSnDrGIrvsgvxSjWrGInmbgvxSfNrGIgcWgvxY:LZv7FQGEvAdP3g69ozfEEC9JAxFi/ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
996b26d99c669998 |
|
VISUAL
aHash
|
000078381c3c0607 |
|
VISUAL
dHash
|
0244d07230f0ccf6 |
|
VISUAL
wHash
|
8100f8f8fefe041f |
|
VISUAL
colorHash
|
30003600000 |
|
VISUAL
cropResistant
|
0244d07230f0ccf6 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 235 techniques to evade detection by security scanners and make reverse engineering more difficult.