Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T155C2B7A16646E83F03B7C2C272D70B3BA6E2924ACC53660557FDC35C5BE9D52FD52804 |
|
CONTENT
ssdeep
|
384:XKRKd9KSUPehzBke5oGKWUneMq+VErKMAJ/AqF1BXS6B/v6NUmDN+Sbi3SafdB+o:aRekINmGKjRd53q+Jpd4iUO |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
8cdb2364338f8e8b |
|
VISUAL
aHash
|
80803c3c18181103 |
|
VISUAL
dHash
|
1330697171b3330b |
|
VISUAL
wHash
|
c1d8fc3c3c193f03 |
|
VISUAL
colorHash
|
38600000048 |
|
VISUAL
cropResistant
|
1635f5a22f14176b,1330697171b3330b |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.