Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T183C2EC74A0A6BA3F4197C2E5A7319B4F72D2D38ACB774B1AA3F8938D1BC2C40DD51049 |
|
CONTENT
ssdeep
|
192:gj5PXDhvDv3daS7jfHVutkQ3uEgMVvS6I1PRHR6K3EVhnfC2UXIW7Kkl4rKGAff:a5Ptv3r7jf1EkQ3NBHI5Rxf6hnfsLtff |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
d17aea852c6e81ba |
|
VISUAL
aHash
|
000000007e7effff |
|
VISUAL
dHash
|
c6c88803d6d64100 |
|
VISUAL
wHash
|
404440007e7effff |
|
VISUAL
colorHash
|
1b600050000 |
|
VISUAL
cropResistant
|
d0d39b94cc88c961,b292929236929392,a54255a4c8ccc8cc,86c888882686d6d6 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.