Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B0C2A5708568503A53774FE4B036AB5E7787C2ADDA93969863BCE3A06BC7CD4CC14AC0 |
|
CONTENT
ssdeep
|
768:MCuVzjE96AJ9vXqR2IHGWwK78L8eOxnCPsaRjd90:b96AJ9vXG2I890 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b8b94786925a4ec7 |
|
VISUAL
aHash
|
ffcfc3cfff000000 |
|
VISUAL
dHash
|
1c1b2b191cf530b1 |
|
VISUAL
wHash
|
ffcfc3cfff000000 |
|
VISUAL
colorHash
|
060000001c0 |
|
VISUAL
cropResistant
|
3a1f3b3b391b14b5,a2a282e2e28282a2,8080a28e8c8e808a,6069d4c413ccc803,3a686848c2a5a4a9,34340c3070323192 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2129 techniques to evade detection by security scanners and make reverse engineering more difficult.