Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T14A92B9B41060567F8C4BE9D16B6CA76A63D0939CCD739B07A3F4B3984BBBDC2B941102 |
|
CONTENT
ssdeep
|
384:Liat+ad55SsbGHggHghXNU08xiulcJ005pSch53ebZE5eu5L:LiattRuHghXNU08xiulcJ005pSch53e8 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ef6968b2929691c3 |
|
VISUAL
aHash
|
8501b1ffe7ffb3ff |
|
VISUAL
dHash
|
1d23634c0c131380 |
|
VISUAL
wHash
|
010000ffe7fb81ff |
|
VISUAL
colorHash
|
07201008080 |
|
VISUAL
cropResistant
|
1d23634c0c131380 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)