Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16033FA5328E9BC2E4B1643CFC4D6696ED2CF038B9631D5CA9E958A1B734C76E40F621C |
|
CONTENT
ssdeep
|
768:b/zo1a55f+HklV9Di4gHXZEZCND7X0P6pLb251byD+XbpH:b/s1a5OQ9DzgHXZEZChLtxb251OgtH |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
fb4b85b419940fe2 |
|
VISUAL
aHash
|
0000b08880ffffff |
|
VISUAL
dHash
|
385b613139710079 |
|
VISUAL
wHash
|
0000f08888ffffff |
|
VISUAL
colorHash
|
16202008001 |
|
VISUAL
cropResistant
|
5b61313931d34479,f89864f0c9c1c0cc,e52494b5722eb4ea,b5b0b0b03109c9cb,9b9a0929a2e4584b,56d7961521a48c69,3a75594b61311339,0100303030300011,2518587878785838 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 936 techniques to evade detection by security scanners and make reverse engineering more difficult.