Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1AB11AF74D1968D264547CBD42AB3E719758A83C4C75B3B4227F593C80FD7C0ACDD9186 |
|
CONTENT
ssdeep
|
24:hR/C7SIUi8xCl1Ikjtrt/T3CZ02jjt3On4:TWRoCUkjth/7CS2jjt3y4 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d8c967666699998c |
|
VISUAL
aHash
|
605858183c3c1000 |
|
VISUAL
dHash
|
c8b0b0f0f0f0d08a |
|
VISUAL
wHash
|
f8f8fcfc7c7c0000 |
|
VISUAL
colorHash
|
38c00018000 |
|
VISUAL
cropResistant
|
92929d963b2d6d44,c8b0b0f0f0f0d08a |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 216 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)