Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1EBE1FD74525222BB112BC9F8B1B1C7A950DAF30FC91BC598A2FC127A17DECC17A81B75 |
|
CONTENT
ssdeep
|
96:TgaJEKhBmhVRGtmE1FEAv05vpEA6+BhNpEAHCdbpEAiXHApEAxJAppEA6lIe+:0UEKhAa1e |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ed69796969928692 |
|
VISUAL
aHash
|
8181ffffffffffff |
|
VISUAL
dHash
|
1b0b763232322200 |
|
VISUAL
wHash
|
818183838383ffff |
|
VISUAL
colorHash
|
0720a000000 |
|
VISUAL
cropResistant
|
1b0b763232322200,9b1999b898948989 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 13 techniques to evade detection by security scanners and make reverse engineering more difficult.