Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1C8D25CAFB39451195923C2FD172F366D7327009F5DAB4910F520E2987DE286BC0BAACD |
|
CONTENT
ssdeep
|
768:Psa2pxEES74xLRdzdz3Jl/Qo2vUwXNAzwUWAyWwR2vYt4L:e04dpDQo2vUxzwUWAnwR2vYt4L |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b4999b8e64298ece |
|
VISUAL
aHash
|
ffefc3c3c3c7efe7 |
|
VISUAL
dHash
|
361c169686061e1e |
|
VISUAL
wHash
|
99c3c3c3c3c3c3c3 |
|
VISUAL
colorHash
|
07e01000000 |
|
VISUAL
cropResistant
|
361c169686061e1e,e860e2e6a4444645 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 9 techniques to evade detection by security scanners and make reverse engineering more difficult.