Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1E9F23E70A0A6AD3F50D3C2E5A3319B4F72D1C38ACA674B19A7F593AE2FC2C54DD51188 |
|
CONTENT
ssdeep
|
384:J5nEvcsrc32Iaf1iBVfZS40wH8KQiKyKAKxKSFKmvKqGmPrkUnk3tgV+KzRADf:+rcGIaf1qfic8A15+fNvKyu |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
b84738cfbcec3812 |
|
VISUAL
aHash
|
000000ffffffffcf |
|
VISUAL
dHash
|
c6c8c8c74365391a |
|
VISUAL
wHash
|
00000072ffffdf8f |
|
VISUAL
colorHash
|
17006000048 |
|
VISUAL
cropResistant
|
e527a19391d9d9e9,194767631b20181a,b886e4c8c8e89896,718989a1c112b689 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.