Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16B3261707041957A9323C5C6D2233F1AB2F2F34FCA5E4A4267B802A45FE7DB4E50A369 |
|
CONTENT
ssdeep
|
192:n6zd0nrb9zigebHBNNCGQyyG6UdTeufjtOPpJpVBefrUWo/xzrzrLaw5telcKwRS:6RMr53ebHXNFFyG6ntJIf6xvvp0QGaPQ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cccc3333cccc3333 |
|
VISUAL
aHash
|
0018003818000000 |
|
VISUAL
dHash
|
00100cb2300c0000 |
|
VISUAL
wHash
|
00000018fffff3ff |
|
VISUAL
colorHash
|
380000005c0 |
|
VISUAL
cropResistant
|
00100cb2300c0000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 89383 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)