Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12CC2C9163184791F1367A3CE8B53DB3A53D69210CD315B8793EA470E2EDAD96CE4323A |
|
CONTENT
ssdeep
|
384:yOdBiM16b8pgeT74dlGU9wr9GZtQMB2h27FFEVUaXYfU9aIJKAjMFJzJoKwCphV8:vU989YlIJ7gF9yKwCphVVKILFPSq+3 |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9c92b2367c313cdc |
|
VISUAL
aHash
|
043c181818007fff |
|
VISUAL
dHash
|
9d687032b033c0c8 |
|
VISUAL
wHash
|
5c3c18181818ffff |
|
VISUAL
colorHash
|
38400038000 |
|
VISUAL
cropResistant
|
9d687032b033c0c8 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.