Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1AFA110B09124AE3F64E3C2D1D7646BBB32D0824BD75712114BFE839E4BDAD95DC220C5 |
|
CONTENT
ssdeep
|
48:TEk3vN+YmZZFEqIVv88V18V58Vv9F3h7QueR18b44k2OE4cFf3uMTF8fSlbLw4:T53BqIi8/8j8p3yBYqEBBtTMKbLw4 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
92b36d3c923c6c74 |
|
VISUAL
aHash
|
067c240e0c303030 |
|
VISUAL
dHash
|
d4c9cc6d48626460 |
|
VISUAL
wHash
|
2e7c3c3e3c3c3838 |
|
VISUAL
colorHash
|
38e00000000 |
|
VISUAL
cropResistant
|
00040a4d4d1a0182,d4c9cc6d48626460 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 34 techniques to evade detection by security scanners and make reverse engineering more difficult.