Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15FE165E1C044DD2B076286D5F7F52B5B7A91C74ACF0209C453F842EB9BDAC70CA26AD9 |
|
CONTENT
ssdeep
|
96:Tk4hWhzP7moh4lzH0XfeGUEdt77XkswvFpeBX9HFYen5Xxz/3t77SqQPJ:Q489P7moh4lzH0X1UEdNkCfVDz/0qQR |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b161ca9e661b1b33 |
|
VISUAL
aHash
|
00c3c3c3c3ffffff |
|
VISUAL
dHash
|
97169e969636280c |
|
VISUAL
wHash
|
00c3c3c3c3dfc7c3 |
|
VISUAL
colorHash
|
0700e000000 |
|
VISUAL
cropResistant
|
96169e969620280c,d9d9d9dddd5d5d5d,22531c39892611cc |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 64 techniques to evade detection by security scanners and make reverse engineering more difficult.