Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T108B1D82FD6481357269384B5B36621CAEB5E001D5372CFE45DA880AC27FDA1288731EE |
|
CONTENT
ssdeep
|
96:0zPAXx/FUltGtGOUlWwSk/96GIcP9EJNpua/7QF8N4cUsWtscO4oA1A9EQQcm:8Psx9OGtGOTE9LP9E7/7wsWt7oKVcm |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bec9c13c30c13e3e |
|
VISUAL
aHash
|
ffdfbfff83837fff |
|
VISUAL
dHash
|
fb3767c72e2ee06c |
|
VISUAL
wHash
|
bf0333f38303071f |
|
VISUAL
colorHash
|
07201000600 |
|
VISUAL
cropResistant
|
fb3767c72e2ee06c,929dcc8f98adac54,292c54dce04c4c4d,edac9c8c9accd839,24a7ceae8c8c5a55 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)