Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1AC5116769085DAE75683A2E09B333B1EBBC0834ACA5B4A0492F593DF3F9BD94CD17111 |
|
CONTENT
ssdeep
|
24:hAOSNEj4KPcNlYNzPn/LvahafJ4kKE/8NYazJ6BSaz3BSazPk8BvVhOHdLB0A4KB:pSc4KuWLjvaM6DY+6B3BPk8BvQB0DHm |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e1c61ccf6438c6e6 |
|
VISUAL
aHash
|
e7e7e7e3e3e3c3c3 |
|
VISUAL
dHash
|
8e8c8c8ecece9696 |
|
VISUAL
wHash
|
434343e3e3e3c3c3 |
|
VISUAL
colorHash
|
06400030000 |
|
VISUAL
cropResistant
|
a0aaaaa9a9a8e9e9,e2e2e26a2e2ed606,8e8c8c8ecece9696 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 6 techniques to evade detection by security scanners and make reverse engineering more difficult.