Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F353F030F161DAFB449392B9A769DB2D33C49384DA175F067BF842922ECADF64C901D8 |
|
CONTENT
ssdeep
|
768:zb2fnMXYe2ql07wiF14BSSvRQW2ErIFbIgofmRQ6YkgDihMBhDmdcB9gqjVcKbyn:zbAFCN2o1yQ6UtW |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
93196c64cf99b075 |
|
VISUAL
aHash
|
02000c3c3e060401 |
|
VISUAL
dHash
|
d623d8596ce47885 |
|
VISUAL
wHash
|
52006e3c3e3e0cff |
|
VISUAL
colorHash
|
38200230000 |
|
VISUAL
cropResistant
|
d623d8596ce47885 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 9956 techniques to evade detection by security scanners and make reverse engineering more difficult.