Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17C7142B080549A3B12C387E1EB727B0B5393C399C7472E4069E4728E4ECEC69CD9D0A5 |
|
CONTENT
ssdeep
|
48:vAS7InNZ9YlHQfIkGBLCZMQy7MENVu5Scu5lSs:n7I1oQfXdZMQFeVu5SHSs |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3c966666466cccc |
|
VISUAL
aHash
|
e3e7ffffffe7e7e7 |
|
VISUAL
dHash
|
4d4c2010584d4d4d |
|
VISUAL
wHash
|
0303272fe7c3c3c3 |
|
VISUAL
colorHash
|
07000010180 |
|
VISUAL
cropResistant
|
4d4c2010584d4d4d,40148c2c1c152c4c,0810303030301008,010004b2b2300010 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 914 techniques to evade detection by security scanners and make reverse engineering more difficult.