Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T114F34D30230C7E7E956383E0E1963325727D5216E50EC828F27C99B6679AC99F437ED8 |
|
CONTENT
ssdeep
|
1536:adAfhUYrLe9mh0w3sfrrrrrwrrrrbrrrr6lyXgfbsQJo2h2wV92949tVPTMn5UCu:acXkXMA2i9nYC4aX3 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
83aa68dafbc186a9 |
|
VISUAL
aHash
|
ff077f7f083c0000 |
|
VISUAL
dHash
|
2bfecec8d8e8c4b0 |
|
VISUAL
wHash
|
ff0f7f7f083e0000 |
|
VISUAL
colorHash
|
01006000040 |
|
VISUAL
cropResistant
|
842b2b6b6b777773,89c9f9fdf9f1e5f1,7252cdea8a4ecb50,879582b2abc2eaae,78f0737379731a18,403040c101902000,e280c067b7c280ca,39eeccd8e8ecd4b0 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 12 techniques to evade detection by security scanners and make reverse engineering more difficult.