Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15492AEB0D582452F4244A142DF02BE4A7DAE45FDBB532B9222E4D9FF34E399CC93A705 |
|
CONTENT
ssdeep
|
384:iiBEnsPnVDoXc3K80Bn+KNkocMPrchGE/NTBLW9ydb2NESXLaf:iMnVE4K80BR53TchP/VFW9weESXLaf |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a6e6499959990bdc |
|
VISUAL
aHash
|
ffe7e7e7ffff1f00 |
|
VISUAL
dHash
|
334d4d4cfbffb4d8 |
|
VISUAL
wHash
|
ffe7e7e7070b0000 |
|
VISUAL
colorHash
|
0e000000000 |
|
VISUAL
cropResistant
|
334d4d4d0ccbf334,63676352db832701,41902432320c9041,0000443adac49840 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 51 techniques to evade detection by security scanners and make reverse engineering more difficult.