Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18D52A6A1B1056B3F498309D8667D4B4B7181DA69CB7F4B52A1F8937C0BCBC518DFCA90 |
|
CONTENT
ssdeep
|
192:yVF1hgR/dzVZ1k9f951wO8PS89r5cughbA3Sxj9XVb0HZRs:iWKf951wU8xgxl19XVbt |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3a666b3198c3399 |
|
VISUAL
aHash
|
e7e7ffffefe7ff00 |
|
VISUAL
dHash
|
4d4d2448584d00aa |
|
VISUAL
wHash
|
2020000803033c00 |
|
VISUAL
colorHash
|
07000007000 |
|
VISUAL
cropResistant
|
4d4d2448584d00aa,b3e4cc98072c3a88,0c60696906d8c802,0000000000000000,0101010100010100,0001010180414180,0000400080414100 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 4 techniques to evade detection by security scanners and make reverse engineering more difficult.