Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CAC13F60D06CCC6B024785C9B2708F9976F19290CB630B0066F973BA6A99CFBEC95198 |
|
CONTENT
ssdeep
|
96:TggyWfdEUXe4eC3eqeJHe+e0eJrEX301C5QVUB5:3hpXe4XeqeJHe+e0e2XEw+UB5 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e464999931c6cece |
|
VISUAL
aHash
|
c3c3c3c3c7ffffff |
|
VISUAL
dHash
|
8e8e8e8e8e000400 |
|
VISUAL
wHash
|
03030303c0f4f0f0 |
|
VISUAL
colorHash
|
070000100c8 |
|
VISUAL
cropResistant
|
8e8e8e8e8e000400,019292a24d696926,c4c6d0d406383220,33e841014949e031 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 9 techniques to evade detection by security scanners and make reverse engineering more difficult.