Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F2F21D30A096AD7F1097D2E5A3319B0F72D1D385CA37570AA7F6A3AE2FC2C55DD41088 |
|
CONTENT
ssdeep
|
384:p5lM2e3r7jf1FshTzNcehCX3vId2KjXKSK7KqvWLcs+tQjlZrP0mD9oVGlUT:22eb7jf1OJyw2ybMhvWLcFVdT |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
917aee856c6e9192 |
|
VISUAL
aHash
|
000000007e7effff |
|
VISUAL
dHash
|
c6c8c803d6d64904 |
|
VISUAL
wHash
|
100444007e7effff |
|
VISUAL
colorHash
|
1b0030000c0 |
|
VISUAL
cropResistant
|
d0d0d2d2b83939a9,b292929236929392,814051051e140606,e6c4c8c82686d6d6 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.