Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F4D19A70C56258B701DFC2E5EB75679B23A28A9FCA13067A97FAD79C4EC8C80DC52143 |
|
CONTENT
ssdeep
|
96:TGu9z4b9tu4nb6eMsxy2Y9GBj3YeFUv0TG6KiBEHAPlRjAL:/4b94426gWNIeFUv0TG8JO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
eb6969639894969c |
|
VISUAL
aHash
|
b9e1f1dfffe7dfdf |
|
VISUAL
dHash
|
6b4363b4b4cc2e3e |
|
VISUAL
wHash
|
a1a1b187ffc38187 |
|
VISUAL
colorHash
|
07200000006 |
|
VISUAL
cropResistant
|
6b4363b4b4cc2e3e,e9e969c9d95b1b27 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 9 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)
Found 9 other scans for this domain