Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1687372347801686630EF4ACEE273798E2284EFC6C99619D9D6F0472469F7C61FED12D8 |
|
CONTENT
ssdeep
|
384:+WoC2zRY+c6WD/gTpSZ95Zx4a7a3pGIa7a3pGwa7a3pGoa7a3pG21ca7a3pGOa7d:2mf+F |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ceb35c4a7b10944f |
|
VISUAL
aHash
|
e0fbff4ff01010b0 |
|
VISUAL
dHash
|
44020eab63f57527 |
|
VISUAL
wHash
|
e0f8ff7ff01010b0 |
|
VISUAL
colorHash
|
07000038000 |
|
VISUAL
cropResistant
|
44020eab63f57527,656065c0787ef6fd,000040d0d0c04840,00000002c9363636,54a94844a8c854d4,9a26329a12929212,0d67f1496771793d,3e64786c79232383 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1264 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)