Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1533231E1D454DD36071686D5B7F67F1B73A1C389CB020D4066F4836A5BCADA0CB1549D |
|
CONTENT
ssdeep
|
192:QUttQTZY+gZgZ++nzYhhn0zA8iIldrRfps50Y1Ygz5QruKwlU8F:QUttAY+ww++zGn0U1a5dps502+uKwa8F |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a1708ade8ef682da |
|
VISUAL
aHash
|
e7c3c3c3e7e7ff7f |
|
VISUAL
dHash
|
0d9e9e8e168e08cc |
|
VISUAL
wHash
|
81c3c3c3c3c3e727 |
|
VISUAL
colorHash
|
06001000180 |
|
VISUAL
cropResistant
|
0d9e9e8e168e08cc,51acb6b5330a5a52 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 59 techniques to evade detection by security scanners and make reverse engineering more difficult.