Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E8C3206441010ABE728B46E5A7B1AFCA63DA7708D91381D852F84B7B9FCDCC0AE07D75 |
|
CONTENT
ssdeep
|
3072:eNrzzCl66N8xq2DZwZwwmPXoTPTcTITmTTTiT9TqQfV:eFzzCl66N8xquwZwwm/oTPTcTITmTTTQ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b5c3615d8ec9612e |
|
VISUAL
aHash
|
ffffffff8682c3c3 |
|
VISUAL
dHash
|
234c0e4164169696 |
|
VISUAL
wHash
|
fde7e7ff800000c3 |
|
VISUAL
colorHash
|
07002000180 |
|
VISUAL
cropResistant
|
234c0e4164169696,c0c7191939283b31 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 20 techniques to evade detection by security scanners and make reverse engineering more difficult.