Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T173B120E0C4A0903305274BD9E5761BE9B5A6C06DCB878F2153988E9F9BC1C9CDD7BC26 |
|
CONTENT
ssdeep
|
96:TUJ5XCC7PvgHCb94lhVk5YG5XZPG50bNkVYFosRJmble6uEr3:wJ5XCATjpIYGVH3 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9119d3d152f2c2f6 |
|
VISUAL
aHash
|
080000000fffffff |
|
VISUAL
dHash
|
f8f2f5fdf896888c |
|
VISUAL
wHash
|
080000051fffffff |
|
VISUAL
colorHash
|
06007000040 |
|
VISUAL
cropResistant
|
f8f2f5fdfc96888c,f8f8faf2f5f5f9f8,f133931d2d72630f |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 29 techniques to evade detection by security scanners and make reverse engineering more difficult.