Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T163A2FA3468A5AE7F5083D2F5A771AB0F72E1D78ACA7B4B06A7F593891FD2C01CE11109 |
|
CONTENT
ssdeep
|
384:m05voiqK2yjXpmbTSLHiJfqnPA3o7Im4X1GKO:mivB26XpmbWiZqnPA31m41w |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d2506e8defe56c10 |
|
VISUAL
aHash
|
000000ffffffffff |
|
VISUAL
dHash
|
c6c888560033806d |
|
VISUAL
wHash
|
0000003fffffff81 |
|
VISUAL
colorHash
|
0f408010000 |
|
VISUAL
cropResistant
|
e4a7a19391d9d9e9,4261323232718861,b886e48888889896,4f4f0f0f070f2727,517dfdfcf8f8f8f8 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.