Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E7B11233C804C96A9665C3E06AEB7108C7078309EB61DE51C6910BFDE854BF0B5736A7 |
|
CONTENT
ssdeep
|
48:k3+DxUha3JxLim7qN3YjkjgEp1jSGd3gm7qo/SvA3Yhm7qqm7qcTvl2r/lZoLDSP:1/2wsnpfLavHEs32H90LUO6j6LpoV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cc3333cccc3333cc |
|
VISUAL
aHash
|
0000001818180000 |
|
VISUAL
dHash
|
00100030b0300000 |
|
VISUAL
wHash
|
0000003c3f3f1b03 |
|
VISUAL
colorHash
|
38000007400 |
|
VISUAL
cropResistant
|
00100030b0300000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)