Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E3520F347009386A55339BC1F4E18F0875A3B73BC6094964E3BA07A6AFCBCE45971B79 |
|
CONTENT
ssdeep
|
384:f3KzYIgqZFz5LtREqLtRlDLtRGqLtRwLITzhBeC3D:CzYIgqZFz5LtuqLtXDLtcqLtmLITzhBV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c8c9636363c9cdcc |
|
VISUAL
aHash
|
e158181800000000 |
|
VISUAL
dHash
|
cfb2b2b200100000 |
|
VISUAL
wHash
|
fffffcfc00000000 |
|
VISUAL
colorHash
|
380000000c6 |
|
VISUAL
cropResistant
|
a200e292938a8080,8080a44c5c8000a2,cfb2b2b200100000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 14 techniques to evade detection by security scanners and make reverse engineering more difficult.