Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F4E265717120CC2261CF6AD8F925631080F7A71ACA8797F5F464A3F616ADC7DEA33059 |
|
CONTENT
ssdeep
|
384:EGt+1+fXXWxiONkjeZ8Aqpm5He5wjh4mr8hlbhknyFWJjU9zC5j2fqtY6g:7t+1IXXWxKqLemrO4gCR2CtHg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9c0f6aaa222bb73a |
|
VISUAL
aHash
|
03181e331cfa98c6 |
|
VISUAL
dHash
|
87f236a2a8b2320c |
|
VISUAL
wHash
|
01191e731efabac6 |
|
VISUAL
colorHash
|
39201008040 |
|
VISUAL
cropResistant
|
87f236a2a8b2320c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 191 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)