Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T17753EBBC41444432814E88D7DA3D764EE29FC14086366E956FA073C77F8AE958B06FEE |
|
CONTENT
ssdeep
|
768:Gd1H0J0LVwlQpLpSnlxeGGNo9+Vm7s7o7A737mu21uaFxqrRe+tdsK2GCOS6e3Wz:S1pLpyfeGGNo92m7s7o7A737mf/U |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b89568ae47ec4c93 |
|
VISUAL
aHash
|
030f9fffffcfc100 |
|
VISUAL
dHash
|
661e3a9a9cab3bb1 |
|
VISUAL
wHash
|
020f0effffc9c900 |
|
VISUAL
colorHash
|
06007000000 |
|
VISUAL
cropResistant
|
661e3a9a9cab3bb1,57475b7333794365,0e9e9e868e610400 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1 techniques to evade detection by security scanners and make reverse engineering more difficult.