Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A3031C7091A6B97F10D7C2E5A6319B4F72D1D38ACA370B1AA7F8A39E1FC2C54DD41089 |
|
CONTENT
ssdeep
|
768:RuPzb7jf1ID2+kcMyXxJvWLctk0+tle/OjAl:4PzUrkQfv1k0+PeJ |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9147bac53d6e1591 |
|
VISUAL
aHash
|
000000007e7effdf |
|
VISUAL
dHash
|
c6c8c802d6d6391a |
|
VISUAL
wHash
|
302400007e7fffdf |
|
VISUAL
colorHash
|
1b001000180 |
|
VISUAL
cropResistant
|
64e4b7d3d3b5a5cb,b2929292369292b2,d42963181a1a3a3a,a6ccc8cc2296d4d6,718989a1c1328689 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.