Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10CF101E1D044DD3A131385EAB7B5275F75A6C345CB020E8853F853BA5BDACA0C923A9A |
|
CONTENT
ssdeep
|
96:Tkf2qP7mohOlzH0XfeGnV78gV7O3E5qDwvlJe5XdHl0RezxXv/4/IZV7DrQPJ:Qf/P7mohOlzH0X1nig43E0BnL54O1rQR |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec4613b33bcc4c6c |
|
VISUAL
aHash
|
00001093c3ffffff |
|
VISUAL
dHash
|
d9dde7270b36300a |
|
VISUAL
wHash
|
00001091c3ffffff |
|
VISUAL
colorHash
|
060060000c0 |
|
VISUAL
cropResistant
|
d9d7e5270b303808,94d9c9d7c5e7e7a7,6aeaadad95a56553,19392d6d6d6c64e5 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 64 techniques to evade detection by security scanners and make reverse engineering more difficult.