Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T112430871D994213B13234AD9B8AFA75AB0D3D23BDB128C60E9BC52DC5FEDCD1E4A1016 |
|
CONTENT
ssdeep
|
1536:TEOUMOpsOrvjFe/eIeQeu3T1ene4eMe/NwsarUplIYIBLF8+Z:TDmsgMOr |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ea9d6ac09736941b |
|
VISUAL
aHash
|
e181838383ffc1c1 |
|
VISUAL
dHash
|
0b33373737a30b03 |
|
VISUAL
wHash
|
f381838783ffc1c1 |
|
VISUAL
colorHash
|
020000080c1 |
|
VISUAL
cropResistant
|
0b33373737a30b03,8195e82327c88380,a6363233321a2260,000002802b6b6b7b,8549f2f357777313,662c4c4c0c672484 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 422 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)