Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B5644CDBE2758A36E65683CCDAE73329707F408FD64A0944F2A48FB8B059CD87917D84 |
|
CONTENT
ssdeep
|
1536:RKhHDH9HZ9TIx9Qw1LneaSTMcw3xFHpI3iYhHl4cQQD5xgIEfGIWpPjq0mAAfoYv:RFwrh7vCSQ9MvaxT0pMoBFmv |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
da254a3d255a3d5a |
|
VISUAL
aHash
|
00f8f8fc0e1cf8fc |
|
VISUAL
dHash
|
220000406830e9c1 |
|
VISUAL
wHash
|
00f8f8fc061cf8fc |
|
VISUAL
colorHash
|
060001c0010 |
|
VISUAL
cropResistant
|
000000407830c9c1,0cb3b10202a2a202,8b8b3149a1f19317 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 127 techniques to evade detection by security scanners and make reverse engineering more difficult.