Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D7F1A73212483A3FA91B47E9F795F376112F8288D22B9259F2F902B153C2D81DC376D8 |
|
CONTENT
ssdeep
|
192:/p08gCYfr9YfdeqB7ydWCHvqHxVk3TDDQ79:/zYpYZirXU79 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b3668c998da56633 |
|
VISUAL
aHash
|
e7e7c3e7efefe7e7 |
|
VISUAL
dHash
|
cc4c4d4c48484c4c |
|
VISUAL
wHash
|
67e0c3c3c3c3c3c3 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
cc4c4d4c48484c4c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.