Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1BDE2DA34A5A6BE7F0483C2E5A7309B4FA2D1D78ACA77474A63F8D39E1BC2C41CE51049 |
|
CONTENT
ssdeep
|
192:e50wvJlzXbvDP8rV6gCyB9l1KuJ5RvYv92wfad6kUhWRHB1C3ZbdyNA017AT:e50mjnkrVQyt1Ks5evcwJaB18CbAT |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
f35244adac6d48b3 |
|
VISUAL
aHash
|
00000000ffffffff |
|
VISUAL
dHash
|
86c98882084a0a06 |
|
VISUAL
wHash
|
00000000ffffffff |
|
VISUAL
colorHash
|
0f000600180 |
|
VISUAL
cropResistant
|
f0f9c8a3b3edd879,2e0a0a064a0a0606,ba86c489c98c9e21 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.