Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12D52F946A3A7642F037383C6D6C74F35AFF6025AE8126B098ADFC70E27CCD16E192506 |
|
CONTENT
ssdeep
|
192:DlVgz4tL1TSv0aUnS6M8+xcg9/HOFBUeru:DQz4tL11aUnm7cg9/HcUn |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ce9ae4e46534649b |
|
VISUAL
aHash
|
ff3c3c0038181818 |
|
VISUAL
dHash
|
a669696061616161 |
|
VISUAL
wHash
|
fffc3c003c383c38 |
|
VISUAL
colorHash
|
30403000040 |
|
VISUAL
cropResistant
|
f0f0d29696f0f0f0,a669696061616161 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)