Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F82266E251D0202A611B9ACB5F266B6C32BB30BFD5BB114167FC47C4CB9AC81FD0A844 |
|
CONTENT
ssdeep
|
192:SklgE9ml40KAAqRZ6+Jf4D4+P20ege2KQ40pAAqRZ6rafquFWKn5/:tV0DRZ6+JgD4+P2Lge2m0sRZ6rayuFWO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
93928c6de5929e96 |
|
VISUAL
aHash
|
7e646c6c40181018 |
|
VISUAL
dHash
|
f4c8c9c9d2303270 |
|
VISUAL
wHash
|
ff7e7c64003c183c |
|
VISUAL
colorHash
|
31038000000 |
|
VISUAL
cropResistant
|
b279c8ba452284f0,f4c8c9c9d2303270 |
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.
Malicious code is obfuscated using 9 techniques to evade detection by security scanners and make reverse engineering more difficult.