Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DE732AA83549F5271AB3436720EE14037379121B680D4D30B254FE9EB6BDC96A0BBFD9 |
|
CONTENT
ssdeep
|
1536:w1FQsA4SrMD4SOlvxIsizMzcnGcI1SMW+q2z6u:wyxPvxhMGWMWxu |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ee6f39311117646c |
|
VISUAL
aHash
|
00fbf1ffffffffff |
|
VISUAL
dHash
|
1e63e74431220000 |
|
VISUAL
wHash
|
0000703099f7ffff |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
3363c444aa2a0000,000041a6a6824100 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 19 techniques to evade detection by security scanners and make reverse engineering more difficult.