Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11F8276336100363E0E5312822B91276EF376D084E706155CDEF9935E9BD6D5EEEB288B |
|
CONTENT
ssdeep
|
384:x+w9IIgR8fuFQgFRZSJ7uSdjwLvh2gFObX:xfIIeC81SRZCk |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c262f511bb7ed40c |
|
VISUAL
aHash
|
0020300003ff00ff |
|
VISUAL
dHash
|
cec7e7e7efe0a43e |
|
VISUAL
wHash
|
0060710103fffeff |
|
VISUAL
colorHash
|
020000001c0 |
|
VISUAL
cropResistant
|
0e1e178736744549,9d9996545d551696,ee2a9b1b1a5b0ded,d9d856666f642469,73e0c4a2a0010000,000004c0062e2650,cecfc7e7e7e7eff8,805aa4e4e0238000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.