Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T127C2327094B5A57B009F73D1A738AB05A3C39382CB520BE557FC936D4BCAE84ED23529 |
|
CONTENT
ssdeep
|
384:2x8xw7pvKpJrVU6tkI4XuxgNaNpA+XxFjH/JO:txbVkIgsVjHc |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
eb6b199094b66663 |
|
VISUAL
aHash
|
f9a9e1f7ffffff9f |
|
VISUAL
dHash
|
2b23032f32230323 |
|
VISUAL
wHash
|
8981e1df8383c39f |
|
VISUAL
colorHash
|
07600000003 |
|
VISUAL
cropResistant
|
2b23032f32230323,696969c9692b3734 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 20 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)