Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T191014E748092EC3704D2C2E046B15B6F22DAD388E71B038697F8E35D0FDDE45EC51111 |
|
CONTENT
ssdeep
|
12:hRwMy7FUUxm3pqwDZSYXCFq97ihdCUDoI:hR/CPxc5SF2KdCM |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9d9db7a6a24a6a48 |
|
VISUAL
aHash
|
ff7f181818000000 |
|
VISUAL
dHash
|
faf271f0b0e8f0f0 |
|
VISUAL
wHash
|
ffff181818183c3c |
|
VISUAL
colorHash
|
38000008180 |
|
VISUAL
cropResistant
|
ffdf4f4f4f4f4fbf,f0d0f0d4d4f0d0f0,faf271f0b0e8f0f0 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 6012 techniques to evade detection by security scanners and make reverse engineering more difficult.