Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E7D2A3B6E2C6313F524383CEFB24BF7DE0E3415EC5960A09CAFD19A46B92D96D6C1049 |
|
CONTENT
ssdeep
|
384:baFWi6uPA6DkCpPCpkUdf0Q4cEH7NLADXmu70MTy4yS4wUjwzYfMhExsfR7CW/s4:+FvNUYa6IIeTdIfHBV2yEVt/ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bc96876d2d349634 |
|
VISUAL
aHash
|
ffffffc381818181 |
|
VISUAL
dHash
|
5613283b0333032b |
|
VISUAL
wHash
|
92ffffc381818183 |
|
VISUAL
colorHash
|
160000001c0 |
|
VISUAL
cropResistant
|
303c2e2b0333030b,4341566656564649,0111013131010101 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)