Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T18BE18626A182AA3645CB83EF773743AFB261C146C10707E96BF8832C57E5DC8CE66581 |
|
CONTENT
ssdeep
|
96:T4Ogj5YeHEPxqMqIlbvvrksiWyTnbZDzg4cvWFBDDgjk:RdRjqIlb7xiWyTbVfcuBD5 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bc4b4d94b1d26366 |
|
VISUAL
aHash
|
000000ffffffffff |
|
VISUAL
dHash
|
f03007300e34342a |
|
VISUAL
wHash
|
000000ffc7ffdfc3 |
|
VISUAL
colorHash
|
070000001c0 |
|
VISUAL
cropResistant
|
10302e0634302e2a,80f06830140e0301 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Victim enters banking credentials including account numbers and security questions. Attacker gains full access to victim's banking services.