Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1A813CB70A095AE7F1093C2E5A7319B4F72D1D34ACA77070AA7F8A39E2FC2C95CD51189 |
|
CONTENT
ssdeep
|
384:75oU/8Yy3r7jf1EQLDnoNwfZ74jvFDcuYR6VGE7BgU87XXh97N:BRyb7jf1EqZ74jDW6b8jXh9J |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
903aaa856f6f81ba |
|
VISUAL
aHash
|
00040000007effff |
|
VISUAL
dHash
|
a4cc8c8a96d6d400 |
|
VISUAL
wHash
|
006444006a7fffff |
|
VISUAL
colorHash
|
1b0010006c0 |
|
VISUAL
cropResistant
|
ca22b76ca0e7e7a7,b2929292369292b2,8542554582c8ccc8,a6cccc9c2286d6d6 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.