Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1AAF2F9E1122046F56087C3D5D672579F739EBAB9CA97AB44E3F8438E26D6C94CC889C0 |
|
CONTENT
ssdeep
|
768:hyB8eCqkgwSbW0K/abjw0eIAt/Cavb4ma8o/zyr44k:YB8eCBgwSy0K/anw0eIAIavkmafj4k |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
eb94946b6b943694 |
|
VISUAL
aHash
|
ffffff818181ffff |
|
VISUAL
dHash
|
68638c130b0b33c4 |
|
VISUAL
wHash
|
9cfcfe80000081ff |
|
VISUAL
colorHash
|
0e600040400 |
|
VISUAL
cropResistant
|
68638c130b0b33c4,1791969080888020 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 8 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)