Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C4127635F48D722002470136FB274B9EA7179065D93903116A7DC22D6DE0DEACD6F76A |
|
CONTENT
ssdeep
|
192:LVztjsC45gxa/i4UCeLh/bqZWXwdlRyF3qRQ:LDpQgxa/i4Uv9qZWmlRF+ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
924d4d476738ccb3 |
|
VISUAL
aHash
|
0000ffffffffffff |
|
VISUAL
dHash
|
b27000964d699d14 |
|
VISUAL
wHash
|
00001c00243c0c1c |
|
VISUAL
colorHash
|
0e0000001c0 |
|
VISUAL
cropResistant
|
3994944d69b19c34,0830321468303008 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.