Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T19323A47512851F3ED013C6E4F6B1B7285379869DDBF74899EA5E03A3C78BD88D623280 |
|
CONTENT
ssdeep
|
768:fPnBI91byQxup5KwfPC8eNQNM26kaNcFD+6/XIid:BIlkgcx+6/Xd |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cc31643333ce33ce |
|
VISUAL
aHash
|
00183c3c3c183c18 |
|
VISUAL
dHash
|
f0f0f071f1716160 |
|
VISUAL
wHash
|
003c3ebdff3c3c10 |
|
VISUAL
colorHash
|
30c00008000 |
|
VISUAL
cropResistant
|
f0f0f071f1716160 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 193030 techniques to evade detection by security scanners and make reverse engineering more difficult.