Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F873BF36A54029364023C3D5FAE2677E2321D748CA5B0E8802ACC77B7DDF979FD22569 |
|
CONTENT
ssdeep
|
1536:IffiHsMQAE+mao1pHQYP7LcIDV+do2oYFUG9R/KfiWyhw74Qj:mAE+mtpwYPUWV+dIYqG9RKiWzpj |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cbc33c73762c5528 |
|
VISUAL
aHash
|
3c3c3c3c3c3c0101 |
|
VISUAL
dHash
|
c9c9e9e1c9c9b3fb |
|
VISUAL
wHash
|
3c7c7c7c7c7c0301 |
|
VISUAL
colorHash
|
07000000183 |
|
VISUAL
cropResistant
|
939bc6ccc3339b9b,f08686d6922a1a9a,c9c9e9e1c9c9b3fb,9862a2a272121208,43b8b852181a1a1c |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 32 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)