Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F0716470A040DC3B1543D6D8E3FAE75F37D981A8CE960506A2F883FE5EE9D42EE61614 |
|
CONTENT
ssdeep
|
48:bJBu6PZAXcnCZNWSwvQQZ71m1AcqNL6Ni5xw206NLGI/Xcm/CSjUX5oqYjd:DusuXwCZwWu7o1ATNL6UM6BGIDjKZYjd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
94d67a700fc6e06d |
|
VISUAL
aHash
|
246e7e3e3e4e0400 |
|
VISUAL
dHash
|
eccce4ecf29ccc32 |
|
VISUAL
wHash
|
647e7e7e3e4e2400 |
|
VISUAL
colorHash
|
190020000c0 |
|
VISUAL
cropResistant
|
f0f8f2f09e9c94e8,39e0e0f0e2c0f8f8,6e6c7c53b6fce8e8,f9f9e1e1e0a68ecc,8280a2c2d2a280a2,828084e07ad880a2,eccce4ecf29ccc32 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)