Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10C72B83823A4502B117BE8D09E396F14D0B6EB1BCF964A7658AC41651E8BF7EF40097D |
|
CONTENT
ssdeep
|
192:j/WfPmLUufJY9dUufU/ZKvlvTgBLQEz1IcILmRIU4D8fk:j/gP25RY9d5s/ZiNMJIcyVt8M |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b14d3c321e63694f |
|
VISUAL
aHash
|
00dfebffffc7c7ff |
|
VISUAL
dHash
|
163612161a9e9e16 |
|
VISUAL
wHash
|
00c3c3cfcfc3c3c3 |
|
VISUAL
colorHash
|
06000038000 |
|
VISUAL
cropResistant
|
961212209e9e9e16,804040108c323208,251d616161450505,d0c0cac6caa4a49a,4d95852595b6b245 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 13203 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)