Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18153A6B06E580D7E968387D7DBD23F9572A994D7E20346E4F3E44A4C0ED2C6CC9CA291 |
|
CONTENT
ssdeep
|
768:1yi+raFRXTQp8pSkbkY3qAeZhYv4lc4C9cU:1VKZhYv4RJU |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bb193dc1c1e5c4ca |
|
VISUAL
aHash
|
af8d9dc1cde78187 |
|
VISUAL
dHash
|
5b39290b190c2b2b |
|
VISUAL
wHash
|
bb8d8f81c5878387 |
|
VISUAL
colorHash
|
07e00008008 |
|
VISUAL
cropResistant
|
5b39290b190c2b2b |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 132 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)