Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16C33D7A6E389877B207350C1A3287F4DA2E59119CF192E4493EE419CE3CDDA5BE335D8 |
|
CONTENT
ssdeep
|
768:k+RfmMfkF1RR3DMPDfXJI+pJ0bFr2QTNneTqJ07w9HEW:/mtR3DMPDfjQTNfJ0Mh |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d357353434343d35 |
|
VISUAL
aHash
|
007d7c7e7e4c4c4c |
|
VISUAL
dHash
|
c4e9daf4c898d898 |
|
VISUAL
wHash
|
007e687e7e7c4c4c |
|
VISUAL
colorHash
|
00000000e00 |
|
VISUAL
cropResistant
|
ddc98dac2a32232b,c4e9daf4c898d898 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 5 techniques to evade detection by security scanners and make reverse engineering more difficult.