Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17A326133A600DD2A8D6B91C8F5C08689515AD349FB3108C6B1B491FF7BC8CF069A979E |
|
CONTENT
ssdeep
|
192:EyYcrc1l52brUeGF6xiWMcnthWeNWbZl4NfMmUU8VCoUA:EVcrc1l52brUeKzyNfMmUFCoUA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9d6362dc297622dc |
|
VISUAL
aHash
|
0103031b1a1e1e07 |
|
VISUAL
dHash
|
fbfafef2b2b0b4ed |
|
VISUAL
wHash
|
01030f1f1f1f1f1f |
|
VISUAL
colorHash
|
00000000038 |
|
VISUAL
cropResistant
|
9f5ad6ec9830c080,6240e2a2e2335afa,fdfdeffb7bfafae4,6c7850b060c00006 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 10 techniques to evade detection by security scanners and make reverse engineering more difficult.