Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16E921B3864A6BD7F0483C2E9A3719B0FB2D2D78ACA375B0A93F5A39D1BC2C45DD11049 |
|
CONTENT
ssdeep
|
192:Z56WOlXbvDcwKM+Ypevv9YlcT1CMvLkSmbsVLgQFZ3UnCIPheCPoGfaaH:Z5NOZnnKM+YivelK1j6sBgQrUCIP/+s |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f272648c8d6d61b3 |
|
VISUAL
aHash
|
00000000ffffffff |
|
VISUAL
dHash
|
86c888d6008ec8cc |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f000600180 |
|
VISUAL
cropResistant
|
f4b427b3b32df0f4,554c88ccd0e8cccc,1a87c688c98c9c23 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.