Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15AA23E716091EA7B04D383EAA770A76BB3C29251C9230B0673F4CB0E9FE3D65CD92601 |
|
CONTENT
ssdeep
|
384:nmplmKmOvNk6H9jkGd3bzXjwOpm2TC7r97g4hFFoMGG:nSEpEk6H9NBEnmA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c0c7273b3b38987c |
|
VISUAL
aHash
|
00705c7c5c5c0000 |
|
VISUAL
dHash
|
18e7949091919648 |
|
VISUAL
wHash
|
70705e7e5e7c5070 |
|
VISUAL
colorHash
|
38600018000 |
|
VISUAL
cropResistant
|
332b33333333332b,09cace080acece4b,18e7949091919648 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 4 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)