Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16E410F2FCC58190D021DE6F575833ACCC2974C2F45A0EB95F9D0908E76F8FDC586699A |
|
CONTENT
ssdeep
|
48:/NytlLdjZ+AGTYPfEyR+u/YtlAYHptPV1tB1lLdjU:/YRyJUPfEyR/wtltptPLtB1R6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bec9c13c30c13e3e |
|
VISUAL
aHash
|
ff9fbfff8383ffff |
|
VISUAL
dHash
|
fb3767c72e2e022c |
|
VISUAL
wHash
|
190303138383ffff |
|
VISUAL
colorHash
|
07201000600 |
|
VISUAL
cropResistant
|
fb3767c72e2e022c,929dcc8f98adac54,292c54dce04c4c4d,edac9c8c9accd839,24a7ceae8c8c5a55 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)