Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T128425134A154E93B5183C3E5D37A232B32F992C6D746011CE6F4832C5FD6D9AEC272A9 |
|
CONTENT
ssdeep
|
192:pKgl8B44WkeYov2hhiV3P8rAQFtxBQkkYVN:444zw3P88EN |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c1e33c3c94b1bc3c |
|
VISUAL
aHash
|
46606c6e7c600013 |
|
VISUAL
dHash
|
94c3c8d8c8c636b6 |
|
VISUAL
wHash
|
42f0fcfefc70001b |
|
VISUAL
colorHash
|
38001000180 |
|
VISUAL
cropResistant
|
94c3c8d8c8c636b6 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)