Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11251D8F398C11C26792B9161F8C7B60852474E59A35207B289F1047F66E8EA9D4EB2B8 |
|
CONTENT
ssdeep
|
48:e+T4cRLT4rAVVd6jPJYoD/k6jPBrRV9FP1A2AFP5fJtWtFPcqV1gVo/XD6BVUynP:94Wv4Y09TBn9YLfqteqVYw6BuynCpu |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c3dc44629d3966d9 |
|
VISUAL
aHash
|
f0f8fc9ebd250f3f |
|
VISUAL
dHash
|
e2a1b03a698dd97c |
|
VISUAL
wHash
|
f0f8fc98b9010d1f |
|
VISUAL
colorHash
|
07041008080 |
|
VISUAL
cropResistant
|
e2a1b03a698dd97c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 51 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)