Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DAB2F838A4A6BE7F4587C2F5A3309B0F62E2D389CA375B0AA3F4939D0BD2C41DD51059 |
|
CONTENT
ssdeep
|
384:7F5Rsf2NQCKM81hDQHQlK1j4sBgQxf/k4uz7vT:JJQXR78QlK1j4SgQxf/kRT |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b8471cb8edc76131 |
|
VISUAL
aHash
|
000000ffdfcfcfcf |
|
VISUAL
dHash
|
84c8cc33183a3a3a |
|
VISUAL
wHash
|
000000ffcfcfcfcf |
|
VISUAL
colorHash
|
16006600000 |
|
VISUAL
cropResistant
|
9184a7b72c9290c5,61191a3a383a3a38,b88ee48cc8ccdcd2,818296b149010101 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.