Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1DE02A64F2D437D1D0B2393CE8657323AEB8B1F82DA316A6CBD97CD5E1B84694C1A3424 |
|
CONTENT
ssdeep
|
96:bPk9UCpYpjB9IB7PaGbfNftCTbEzZGhYDPdxqWgXxRqJVWZZJmNcP0zKNhxlvPFt:paYpB9IBGUfx9UY5bHksK0zKNh3uZ6 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
eb98c93ce2346734 |
|
VISUAL
aHash
|
c39999ff818181bd |
|
VISUAL
dHash
|
3333715525453345 |
|
VISUAL
wHash
|
c399bdbd818181bd |
|
VISUAL
colorHash
|
3a200070000 |
|
VISUAL
cropResistant
|
fcfcfcfe7efcfcfc,3333715525453345 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.