Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1ADF3613488426A3B026311C0A5765BA5F1D7960FDFA719005AFCC3EA2BE7E44FC2967D |
|
CONTENT
ssdeep
|
3072:aG1sNmQVs7lOLHVb4bucioQSZRRfdUQiWIUVhg:F1ioQEPg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
e9a6354e714f7016 |
|
VISUAL
aHash
|
00ffffe8f8f8f8c0 |
|
VISUAL
dHash
|
2320188b21210392 |
|
VISUAL
wHash
|
00fffee0f0f0f0c0 |
|
VISUAL
colorHash
|
07202000600 |
|
VISUAL
cropResistant
|
23341b8b21218292,0000909090909020,1c8cce468c464e7e,0c0919484c4c1913,9d1f0f8f87a78d9c |
Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.
Malicious code is obfuscated using 1609 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)