Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1D76296F19148141F2326D6C5EAA6AFCD6267850BCB0E157BF6B8245FB68DCF8C4B2350 |
|
CONTENT
ssdeep
|
384:eSiSp01MGgR7Ip8bg2TKXkDPTWl4Nk9Gs90s90s90zdti:ejw0uGg5Hbg2T4kDPTytAs6s6s6zdti |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b366cc328e339933 |
|
VISUAL
aHash
|
e7e7e7e7e7e7e7e7 |
|
VISUAL
dHash
|
4d4d4d4d4d4d4d4c |
|
VISUAL
wHash
|
0000000007072727 |
|
VISUAL
colorHash
|
060020001c0 |
|
VISUAL
cropResistant
|
4d4d4d4d4d4d4d4c,aa8e8e8e969aa6a6,96d237b2d201a2d0,1ecccac8c97dfcf8,ffffffffffffffff |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 4 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)