Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12043746051335A6B02A383C1A6B69F9DD1C08350E3674B69F3ECC76FAECEC44BD55262 |
|
CONTENT
ssdeep
|
768:R4gWtQ+mNa7zy2WD20413M+y0hsC63SQ4edF:6btQ+mNa7zy2WD2ZL6iQ4edF |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bad74d2c119586d5 |
|
VISUAL
aHash
|
02a4fe4cc5818100 |
|
VISUAL
dHash
|
36494c9919252711 |
|
VISUAL
wHash
|
02f5fecfcdc38101 |
|
VISUAL
colorHash
|
300000084c0 |
|
VISUAL
cropResistant
|
36494c9919252711 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 155 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)