Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C69142B3A2099F2F272285C4DB837618C2334389C6595C61A2ED13CB59CAFB5E83315B |
|
CONTENT
ssdeep
|
48:TPJJwNgXcojKnNawLY3QXTz/uSWmn8rIdYPN3w8zc953xTN1TNbsTNeAdxcWP9Uh:TwqXcpnNGlBx9obUWjT |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
edaa962e1a496dd0 |
|
VISUAL
aHash
|
fffff9999931fafe |
|
VISUAL
dHash
|
8162437373731248 |
|
VISUAL
wHash
|
7cfb3919113130fc |
|
VISUAL
colorHash
|
07007000080 |
|
VISUAL
cropResistant
|
8162437373731248,474b05870637346e |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 16 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)