Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16D9142B3A2059F2F272285C4DB837618C2330389C6595D61A2ED13CB59CAFB5E83315B |
|
CONTENT
ssdeep
|
48:TPJJwNgXcojKnNawLY3QXTz/uSWmn8rIdYPN3w8zc953xTN1TNbsTNeAdxcWP9Un:TwqXcpnNGlBx9obUWjp |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
edaa962e1a496dd0 |
|
VISUAL
aHash
|
fffff9999931fafe |
|
VISUAL
dHash
|
8562437373731240 |
|
VISUAL
wHash
|
fcf93919111130fe |
|
VISUAL
colorHash
|
07007000080 |
|
VISUAL
cropResistant
|
8562437373731240,474b05870637346e |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 16 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)