Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CC52A760D1248D3B9163C3DAFB25677F33C52149F986470293FE43A8D5EAC85FC26A1A |
|
CONTENT
ssdeep
|
192:KkGTCBSMbN5Q9cExFNUTOUV1jPjr1lUv+jVVyc5QZr3:K9TCBSAN5iNUqU/PvrCdUo3 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f931c6467c13136d |
|
VISUAL
aHash
|
00ffcbc7c3ffffff |
|
VISUAL
dHash
|
14061b9f876d2930 |
|
VISUAL
wHash
|
00f38185c1d3ff9e |
|
VISUAL
colorHash
|
07000030400 |
|
VISUAL
cropResistant
|
1c061b9f876d2930,00080434b2b2340c,0000200e06200000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 188 techniques to evade detection by security scanners and make reverse engineering more difficult.