Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C65575E16620A3AD90C7DAEDDF39DE90530F40BAB976D6C18ABEC75C5487D80FB06814 |
|
CONTENT
ssdeep
|
3072:Lxi0jog36RVac2z6nysNKTLmTbp0l4fNXBo1Jkggut0MFmXwDzvJTiXYl8Uvz1Ts:LTxBPvh7+J9L |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cb9960e634ca9dc9 |
|
VISUAL
aHash
|
00183c3c3c3c1800 |
|
VISUAL
dHash
|
9f79717171696b8f |
|
VISUAL
wHash
|
0018bdbdbfbdb900 |
|
VISUAL
colorHash
|
0e000038000 |
|
VISUAL
cropResistant
|
f8dcacc38e595588,9f79717171696b8f,3434b5d4d4353434 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 20 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)