Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T183D3B874962C72FC451F97EDA630A5242B1F40EEBD828D3487ADCE7443A3560CA97D8E |
|
CONTENT
ssdeep
|
1536:6sqZx9DcntYKr0RwZWn7zKe2Vx4Ak/pzz/PIwRS4pDpCFWDbCukPJ5PnAPbL1y:Sx9DcLWu |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cd4373ccc9a323a9 |
|
VISUAL
aHash
|
c100003c180081c3 |
|
VISUAL
dHash
|
03b04832322b3307 |
|
VISUAL
wHash
|
e1182c3c18dbc7e7 |
|
VISUAL
colorHash
|
38012000400 |
|
VISUAL
cropResistant
|
0000144c4d0c3004,03b04832322b3307 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 6316 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)