Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T197B2C63561847EBF0287C2E9DBA4631D72F1D68ACEBB464263F78B4C4BC2D15D80291D |
|
CONTENT
ssdeep
|
384:s5V6MdbOdibSB0WSM/CD+FrPYc8bqE/2AdPg1x9kCPImh:s59+ibSK1MaOPYc8uERPgz2O1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
86a63c7f4c9831d3 |
|
VISUAL
aHash
|
30277f7f70003c00 |
|
VISUAL
dHash
|
64eccdf4ec49f830 |
|
VISUAL
wHash
|
26277f7f7c003c18 |
|
VISUAL
colorHash
|
0e400008080 |
|
VISUAL
cropResistant
|
3e7ffaf153dadcfc,99a9e89bb2346663,654ccec64ec60ecc,954dcd4c8ed523b1,de5656dad2d6d65a,64eccdf4ec49f830 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 71 techniques to evade detection by security scanners and make reverse engineering more difficult.