Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19D3211E1D054ED37471285D9B7F67B6B36A2C344CF020A4453F893AB5BCEDA0CB129A9 |
|
CONTENT
ssdeep
|
192:QfYpzDx2sB8i1tGmG1Aer2ghLb2DXa4JEDL8F:QfmcsB11tGmGCerdhb2O4WDL8F |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8c5ca37626f013f3 |
|
VISUAL
aHash
|
001818180000ffff |
|
VISUAL
dHash
|
75b2b2b2316916c0 |
|
VISUAL
wHash
|
8018181810ffffff |
|
VISUAL
colorHash
|
020000001c0 |
|
VISUAL
cropResistant
|
f282b45252b4d0f0,3333a2e9d5d5554a,00000000c000d0d0,55b0b2b2b2b27169 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 64 techniques to evade detection by security scanners and make reverse engineering more difficult.