Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T188357375234C3E2CA51B8BE4F355B7A8126D9294F94FD1AC91BC62B20787C88F9379C4 |
|
CONTENT
ssdeep
|
1536:n0w6Em2RyBZc/gZcOEkb5c7avfVtdcwctcCc7szEvvvvYKiHvvvvwzvvvvhXvvv/:nJj7u7JF7VJ/ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
eb4994464f614d6b |
|
VISUAL
aHash
|
00ff89b9b9b981ff |
|
VISUAL
dHash
|
6073537b63630b2b |
|
VISUAL
wHash
|
00bd89a9b99981ff |
|
VISUAL
colorHash
|
070000081c0 |
|
VISUAL
cropResistant
|
8080a2e2ea80a280,6d735b6b63630b2f,0000626262620000,e3e5830509030801,1f3b362773333971,319e9a9ad8923106 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 64 techniques to evade detection by security scanners and make reverse engineering more difficult.