Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T146C2FE4262481996C2F3499855102580A383EF4FC96487B085BD4E7F2FE7AB167E9F3F |
|
CONTENT
ssdeep
|
768:JNNNtLasEWq++t1aClAttwzSiJiviGi+ERbtht4tXtU/5DFjTFaHVo:JNNNtLasEWq++naClAttwzJYa9+ER5Dp |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
981863e766e76519 |
|
VISUAL
aHash
|
001c0c000cffff00 |
|
VISUAL
dHash
|
bc38b0b4b00e0da1 |
|
VISUAL
wHash
|
0c1e1e141effff00 |
|
VISUAL
colorHash
|
33007000000 |
|
VISUAL
cropResistant
|
62641032515b5860,0000000e0e000000,c834b8b8b0b4b4b8,0000408303400000 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 5 techniques to evade detection by security scanners and make reverse engineering more difficult.