Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T130D10170522075BE1ED3F992AAA63F8D1161E070F4171289C7F85A2E0EC6F94EDE9364 |
|
CONTENT
ssdeep
|
96:hclG8qQ2XC+uzBxbUQPk21KTj6eAc3ZOH/dnNIX41jzO9U3Z2hhK++ZS:hcls3KvOfcfj1ONhjl |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9d8db272651d923a |
|
VISUAL
aHash
|
ffff1f1a00000000 |
|
VISUAL
dHash
|
fc3333f2923934a8 |
|
VISUAL
wHash
|
ffffff3b70000000 |
|
VISUAL
colorHash
|
03e09000000 |
|
VISUAL
cropResistant
|
7c7cf133337132f2,33b2f293a93430c8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.
| ID | Portuguese | English | Trigger |
|---|---|---|---|
Pages with identical visual appearance (based on perceptual hash)