Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18C927CA28D5640CBB715B2D094172E39AD81CC3F52F24A4CA5BFD2E0F7B69D2EA1D344 |
|
CONTENT
ssdeep
|
192:CuZ7xpXxZ7S/BAynsG5XTMPnqRrvkxAaEx5B5nLsdEN:CotpXxRSpYs18QZnLsda |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
a0a195ecce1f3996 |
|
VISUAL
aHash
|
ffff6f00f1000400 |
|
VISUAL
dHash
|
8e8e8eababa36c6c |
|
VISUAL
wHash
|
ffff6f30fb000400 |
|
VISUAL
colorHash
|
19400018000 |
|
VISUAL
cropResistant
|
8ab3adb5908caca5,e49c1a5afaf89c2c,78ccc95885c96638,6b41c0828687a34b,d69616d6d65695d5,fffbdbe3dcf9ae9e,888b0b4b6beb2b3b,8e8e8eababa36c6c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 10 techniques to evade detection by security scanners and make reverse engineering more difficult.