Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D343CF35E6067D6F8F1E45B9F21F5104649AE1EE861E1184F2E42B3F5488D8AAC3D32F |
|
CONTENT
ssdeep
|
384:ij/9lPoC3GsfXKjTPXUQ/0DBzxgsCzQNBssybLRFiPhLB8HZdV7JPRwvmOwnssBK:ijzhcLXQDBr8sqJPRwEb3U8sTGg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c33cc33ce92ac3e2 |
|
VISUAL
aHash
|
000464200424607c |
|
VISUAL
dHash
|
41dcccc8acccc8c8 |
|
VISUAL
wHash
|
01747c0c5c7e7c7c |
|
VISUAL
colorHash
|
30000038000 |
|
VISUAL
cropResistant
|
08304c4c4c083000,00702c244c0c1000,41dcccc8acccc8c8 |
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.