Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T10643E67306D83936532AC3DD92247E19E3D19247DA824BC4B3F913ADEF95D12ED2228D |
|
CONTENT
ssdeep
|
1536:FDmzOAOMpH6p6RSa0NAwzIeKqevte8Ae5teULeLJeK1e17jeDa8e/QAFp:FDmz5OMpH6MRSa0NpzCJbZNQfQh7QAFp |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b6cb36cbb2c93032 |
|
VISUAL
aHash
|
7e3c007e7e7e4606 |
|
VISUAL
dHash
|
cc692fd4ccf88c0c |
|
VISUAL
wHash
|
7e34007e7e7e4606 |
|
VISUAL
colorHash
|
06008009400 |
|
VISUAL
cropResistant
|
cc692fd4ccf88c0c,d2968b8a96b596c8,7091999191b15696 |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 7 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)