Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T179A39A3AA31047359A094BCCCBE1A919283F11DF67147798B63601B2FA2DCED5CBB1D9 |
|
CONTENT
ssdeep
|
1536:xUPkMeh1m8ELnqU/g1S81wjIXDOGNwIjd6dgUlBY+Rg:xUfLnqU/g1S81wwDOGNVjbUlBhRg |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ab53b469c3e103ec |
|
VISUAL
aHash
|
688404292103c387 |
|
VISUAL
dHash
|
d92c59db6bd72f2e |
|
VISUAL
wHash
|
ec9c2d693303c787 |
|
VISUAL
colorHash
|
30000e00000 |
|
VISUAL
cropResistant
|
0204081122458810,3b77ceddba74c890,a2a2a08e8f8c80a2,d92c59db6bd72f2e |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 3 techniques to evade detection by security scanners and make reverse engineering more difficult.
| ID | Portuguese | English | Trigger |
|---|---|---|---|
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain