Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E0732BD0A7B4213F42D357CDFF251BA9715A91FED663468862BCCAE8ABC3DC4EA05440 |
|
CONTENT
ssdeep
|
768:CkyJFknYbyKbkqLa03VFuecGFzfrba3frRAZ9nfP63Vk9luz499a2YqQQDjGYgc/:xyJFkna3EoyvWnHbnavQnGYgcoTWA+z |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f0a9871778728d0f |
|
VISUAL
aHash
|
ffffffc0c002a000 |
|
VISUAL
dHash
|
4277a787aa664ca8 |
|
VISUAL
wHash
|
ffffffc0c002a400 |
|
VISUAL
colorHash
|
1b000038040 |
|
VISUAL
cropResistant
|
ac6ed3ce0c2182f4,386340d390a02000,8e9acae47261741e,4277a787aa664ca8 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 36 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)