Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12403B531909B253B033716D9B6A5BB1EB0E7E39CCA034B0036FC57AD5FCAE50E925192 |
|
CONTENT
ssdeep
|
384:MzvqlBv33LV2ZnhKS6Zmcnp0uIaLe2gU+DQ8aY5ZKm9oIB+g9aBNfBNltA:MzchkhKS6Zvn+uIxZQcKywgWXltA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9a226197cec6cd93 |
|
VISUAL
aHash
|
00001c3c3c3c0000 |
|
VISUAL
dHash
|
4c9b396969715412 |
|
VISUAL
wHash
|
2c003c3c3ebebcda |
|
VISUAL
colorHash
|
00000000e00 |
|
VISUAL
cropResistant
|
d68bc9c7d6fa93f0,4c9b396969715412 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 39 techniques to evade detection by security scanners and make reverse engineering more difficult.