Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15573A772A2212837607FB1D9F165B71991D3D74FCA8247E1A2FC936A0EDACA1FC17805 |
|
CONTENT
ssdeep
|
1536:P49XWn+rx3CejtKLUiJMsmk2E7m90w7bz3EETFm3UJIiEq:Q9XW03Tssamqw7bz3EyB |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec964363699c9c69 |
|
VISUAL
aHash
|
2024dfffc3c3c3c3 |
|
VISUAL
dHash
|
c8c8363097071696 |
|
VISUAL
wHash
|
0800dfffc3c3c3c3 |
|
VISUAL
colorHash
|
07201008040 |
|
VISUAL
cropResistant
|
c8c8363097071696,c717170143411747,537130b49899d137,e1e0604c2462503f,6028382cde4b6f68,5c6cdcdaab325170,b1a3073b371f3861,1f153364d4443107,17737174d8417317,33234dd9c95d4b0f |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 210 techniques to evade detection by security scanners and make reverse engineering more difficult.