Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19DD18825901C1C3F6143A2EDA3E5FF1AE1D99C41C7111B64F6FD02E80EE2EEA9447575 |
|
CONTENT
ssdeep
|
96:8tAlUrTHRpVrrid33cygV9JQhdSXHgEX8tutrpHF45H56qu:8iUr5o3cyBdSXAEX8Mtdmu |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c3b325e60b855ce5 |
|
VISUAL
aHash
|
e7c7cc6cfdf2fb00 |
|
VISUAL
dHash
|
ce9c985929246643 |
|
VISUAL
wHash
|
67c6cc2cfcf2f200 |
|
VISUAL
colorHash
|
07003000180 |
|
VISUAL
cropResistant
|
ce8c985969246666,4b0b4b0b2b4b4b4a |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2352 techniques to evade detection by security scanners and make reverse engineering more difficult.