Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B1C22C34A0A6BD3F5593C2E1A3309B4F72D1D68ACA77071AA7F4A35E1FC2C45DE61088 |
|
CONTENT
ssdeep
|
192:/3eb5KZGNKvDFVlRaSZmxgCCmD3iSS6cjrYRytpWcNNGNSvqhNJaEeHKalXgV:Gb5KZGNQ7lfZ8PHbPcSIi1CvgV |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
931212ecec6d6d69 |
|
VISUAL
aHash
|
000400ffffffffff |
|
VISUAL
dHash
|
ccc8c8d608cec8cc |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f003400000 |
|
VISUAL
cropResistant
|
dac2c03632c1eca4,55cc8cccd0c8ccc4,b886ccc8c8c8d8d6 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.