Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T156D2EB34A096AD7F1493C2E5A7309B4F72D1D28ACB775B1A93F8A39E1FC2C44DE51089 |
|
CONTENT
ssdeep
|
384:15O9Pnt3r7jf1Q+LxvfZg6wqiHbCtvQtaB18QebXf:yNtb7jf1QeZg6wqiHbuo8B18QK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d07aaa856d6ec1b2 |
|
VISUAL
aHash
|
000400007e7effff |
|
VISUAL
dHash
|
868d8c03d6d64900 |
|
VISUAL
wHash
|
404440007e7effff |
|
VISUAL
colorHash
|
1b000600180 |
|
VISUAL
cropResistant
|
1c090bb276de7f6f,b292929236929392,a54255a4c8ccccc8,868c8d9c2286d6d6 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.