Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15E11466151451FFEB187C154BAC1E39BE7C84940CB4707011FD4B3D54ADED98C5786C8 |
|
CONTENT
ssdeep
|
12:nwMy7FUEDg8NOckr7dFgBZcRoWwXaPJE6HdEI9FuP05MP4HKkUt3ohbFgLeK:n/CjDfQr7dcZgAXaPJECeIJv1wSK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e666999999666626 |
|
VISUAL
aHash
|
e7e7e7e7ffffffff |
|
VISUAL
dHash
|
0c0c0d0c00000000 |
|
VISUAL
wHash
|
e3e3e7e700000000 |
|
VISUAL
colorHash
|
07002c00000 |
|
VISUAL
cropResistant
|
0c0c0d0c00000000 |
Victim enters credentials into 1 fake form. Form data is captured via JavaScript or backend submission and transmitted to attacker's server for account compromise.
Malicious code is obfuscated using 1 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)