Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F1C25FF06025AF33826386C3B7839B57B2E4C285CA86265157FA87F84FE4C91EC1955B |
|
CONTENT
ssdeep
|
384:kugs/nbHygq+YfOAMdWCIi8z6YmNul95tRrIuo9sg2QyIeICOrVC8bdngfgjQpS:VzRYRUo6YmNYIXbC84gjmS |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
982927328d97a78f |
|
VISUAL
aHash
|
0000e7ffffffffff |
|
VISUAL
dHash
|
a3b34eb0b10d290a |
|
VISUAL
wHash
|
000000fffde5edf3 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
0c30b1310d2d090e,030383a3a3a38303 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1131 techniques to evade detection by security scanners and make reverse engineering more difficult.