Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12071DA7560CA0B3762874AD6EA29CF2EE2D84580D31A4195D7E8029E4BFBF41CB9B341 |
|
CONTENT
ssdeep
|
48:bjH/kLMLPsueU6jEfGWHk0VfX8QXS7iJNgdyhMKbVqwsI4Hhnyr7tK:KqdRAEfdE0Vf8QXS7ifhhMqqwRftK |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9c4ab62632b7329d |
|
VISUAL
aHash
|
000000000000ffff |
|
VISUAL
dHash
|
c430707030542a2a |
|
VISUAL
wHash
|
0018181818ffffff |
|
VISUAL
colorHash
|
3a000002030 |
|
VISUAL
cropResistant
|
4022aa2a2a2a2a30,c430707030707010 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 73 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)