Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11B92FA460585782E0B1642CDDF82A769E7CB4341CD32AA46C6EDCF6F6ECAD42C9B311D |
|
CONTENT
ssdeep
|
384:Et7zbTgbY+txLpso0/gCZf402UbkVJ0x5jmA:E9zyLcgCZfqAgA |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ce9a93763433326c |
|
VISUAL
aHash
|
3cbd3c1818003c20 |
|
VISUAL
dHash
|
6d707171b6605148 |
|
VISUAL
wHash
|
7eff3c3c18203c38 |
|
VISUAL
colorHash
|
38000c00018 |
|
VISUAL
cropResistant
|
6d707171b6605148 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.