Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T11872A6A2B0C0B3390BD70127E611A7B4F36580D8C5B1362566DFC69E86C557ACF6B22F |
|
CONTENT
ssdeep
|
384:235ZqTCP3MTTmoYa6r5ZJqC5F00RZqq0Uoh1GmajYWmCAYSproTB76p:235ZqTCP3MTTmoYa6r5ZJqC5F00RZqq+ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c7c6313936ce6c38 |
|
VISUAL
aHash
|
283c303438383c20 |
|
VISUAL
dHash
|
d0c86464c4d0e0c0 |
|
VISUAL
wHash
|
307e3c3c3c7c7c30 |
|
VISUAL
colorHash
|
38600000080 |
|
VISUAL
cropResistant
|
d0c86464c4d0e0c0 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.