Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T158D1C0E0E21819666073E2D9F9BF772B50A1E34BC607558C66E8F1763D87DB1BD001E4 |
|
CONTENT
ssdeep
|
192:gZ1Ef73xU61jWfqpzqX5+B3i6ynJBAkJ+c38fAlxeDtYTTX+uLJwGxRGm:gZDMRVoCG |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b186ce7931c6319b |
|
VISUAL
aHash
|
ffffcfcfcfcbffff |
|
VISUAL
dHash
|
10609899989a6410 |
|
VISUAL
wHash
|
fcfcccccccc8c0d0 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
10609899989a6410,0004303232040000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1 techniques to evade detection by security scanners and make reverse engineering more difficult.