Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E6A17573E2099C271731C2989FCAF389976642C2C4394D20E3DD52DF06C6EB5E933101 |
|
CONTENT
ssdeep
|
48:TcRbtmZYMd6fXdwPTZP6rEx42rIdTTZiP6L00J3ojWujXjsjg8jl1AsNs8TTZiPz:TcvrNwsEPWCzEPJqqJWIG6yi5L/lZ1I1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cb4bb4e464b6352c |
|
VISUAL
aHash
|
fbf93939f8f9ffff |
|
VISUAL
dHash
|
836b6bd353130c22 |
|
VISUAL
wHash
|
4139393838f8eb9e |
|
VISUAL
colorHash
|
07206000040 |
|
VISUAL
cropResistant
|
836b6bd353130c22,434b45c70635346e |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 21 techniques to evade detection by security scanners and make reverse engineering more difficult.