Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E2E3B83462852A7DA21382E5F3E5A73C51A9D349C71B8D5CF3EC02B327CEC99992B1D4 |
|
CONTENT
ssdeep
|
3072:bLBrwmFyW3vBt+N+1+y+F4B9u82yi3BpvZui0X:btwmFyW3j+N+1+y+FjFyiTvZui0X |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ce933334939a8e33 |
|
VISUAL
aHash
|
2c001c3c18181000 |
|
VISUAL
dHash
|
4904607113243202 |
|
VISUAL
wHash
|
6f371d7d3c180911 |
|
VISUAL
colorHash
|
38006200000 |
|
VISUAL
cropResistant
|
4904607113243202 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 20 techniques to evade detection by security scanners and make reverse engineering more difficult.