Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T124C4A7E3EA389939002756F1D3E7B68577D8F281C7A10984C3EC2351ABEDDB01527A5E |
|
CONTENT
ssdeep
|
3072:3zQfbGuSyGuxGuSyGudHn7TvPIHn7TvPRCC+26aLCC+26aGtEBx1Z5YHjdYtNha1:3e0CC+26aLCC+26aGtEBxVYHitNha1 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bac5c590d03ec53b |
|
VISUAL
aHash
|
ffbd8181818181df |
|
VISUAL
dHash
|
e961393939313939 |
|
VISUAL
wHash
|
ffbd8181818181ff |
|
VISUAL
colorHash
|
076000c0000 |
|
VISUAL
cropResistant
|
e961393939313939,b5362e8a4a4a76b7,e0ac383c34307434 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 26395 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)