Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1ABB2B6A453446D3DB05383E8CB36337A32BA52D6E70A5208C5F843B8AA95DDEDC375D8 |
|
CONTENT
ssdeep
|
384:usK1s5swhNSz6btp6KnP0iDhTa4P+x5eFy:uj1yNpf0iDY48eFy |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
999a6f6922ba88ae |
|
VISUAL
aHash
|
9d0c1c1c08188080 |
|
VISUAL
dHash
|
7978313950d22810 |
|
VISUAL
wHash
|
fddc9e1e1c3d8088 |
|
VISUAL
colorHash
|
38038000000 |
|
VISUAL
cropResistant
|
7978313950d22810 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)