Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B132526A774633334A9302D4AB5DA2D4AB31F28053311FC0B59D02A8DBDF9F6B526EC5 |
|
CONTENT
ssdeep
|
192:ZHoZonRyZZeaT2hFtOdrijKwoSrMlo9SRGZImqOf3yRl8mT7uwGEdiXcr1Lf2gcQ:2aL9OdIEl/p5kECiLdxQx6N |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
91a9669ee9e495c1 |
|
VISUAL
aHash
|
00004f0f4f0f0000 |
|
VISUAL
dHash
|
609a9a9a9a9adaca |
|
VISUAL
wHash
|
ff0a6f4f6f0f2000 |
|
VISUAL
colorHash
|
3ac00600000 |
|
VISUAL
cropResistant
|
0000000000000080,fefbe9c1a2c6ccc1,7838585c1cbc8dac,659a9a9a9a9acaca |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.