Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C033AA77C14110E7B92B31D658B7178D76B69928B5BB4D05A6FEE7E8ABC3CD0AD08300 |
|
CONTENT
ssdeep
|
384:i7qUvrm15qrg953K6KS10UdKj2SYRB2ofvB25ku:i7Rrm15qctOUdo7LofvB25z |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9f983362e7b610d1 |
|
VISUAL
aHash
|
801c1ebeb000a0be |
|
VISUAL
dHash
|
2c30307466916e6a |
|
VISUAL
wHash
|
869d1ebfb800a2ee |
|
VISUAL
colorHash
|
1a206000000 |
|
VISUAL
cropResistant
|
b2e66cf0e8e424e9,24a6f464f0e16363,8092f17960f9b1f0,8ef2e2a29a3832b4,2c30307466916e6a |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 8 techniques to evade detection by security scanners and make reverse engineering more difficult.