Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E502EDE0C554ED3B435385D5ABB56B1B77D2C348CF030944A3F883AB9BDACA0CA525AD |
|
CONTENT
ssdeep
|
192:QAu3zYhhgoKt8iINKonXYii1f7zPFin7lc:QAgGgoG1YKoIiiNfFi72 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9e1ba164c69b199b |
|
VISUAL
aHash
|
e7003c3c0000ffff |
|
VISUAL
dHash
|
0e61696969966800 |
|
VISUAL
wHash
|
ff003c3c0000ffff |
|
VISUAL
colorHash
|
030000001c0 |
|
VISUAL
cropResistant
|
00180c0c0c2c0c0c,8c8e9a9296b2cccc,0000000000000000,1669696969691628 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 64 techniques to evade detection by security scanners and make reverse engineering more difficult.