Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T13BC1BDB1571098BF1E92DDD6EEA23E0691C5D061EC071199E3E8992D0AC5FBCD8A236C |
|
CONTENT
ssdeep
|
96:TcdlG8cNhX9HSDzBl0iaIXzj1Kn+eAz3ZLH/dBzcXC9WVzO9j3ZphDggJ4Z9s2:Adlm9yk3ifLKORhBJ4b |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9d8db272651d923a |
|
VISUAL
aHash
|
ffff1f1a00000000 |
|
VISUAL
dHash
|
fc3333f2923934a8 |
|
VISUAL
wHash
|
ffffff3b70000000 |
|
VISUAL
colorHash
|
03e09000000 |
|
VISUAL
cropResistant
|
7c7cf133337132f2,1d4d5c5a3e36d757,31b2f29bb93430c8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)