Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1B8F21D709196BE3B10D7C2E5A6309B4F72E1D34ACA375B1A97F4A39E2FC6C44CE51089 |
|
CONTENT
ssdeep
|
384:o5wVg8J/g3r7jf1akYpFMv85Rxf6hnfsHDOBgDd1R8hn7Zf:hrIb7jf1akUSkRxfQfs2nx |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c17aea85ed6e1191 |
|
VISUAL
aHash
|
000000007e7effff |
|
VISUAL
dHash
|
c6cccc22d6d6692a |
|
VISUAL
wHash
|
100400007effffff |
|
VISUAL
colorHash
|
1b001000180 |
|
VISUAL
cropResistant
|
b2929292369292b2,a84145842bab2b2b,a6c4cccca296d4d6 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 1159 techniques to evade detection by security scanners and make reverse engineering more difficult.