Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16CC2E84134D9B81D4F7A53CFDAD6436AD2CF8362C732E8CED2528706379869786D221E |
|
CONTENT
ssdeep
|
384:UX1UCrJzMEMQFe1/1LdpY3gpZyHE2C/vkzFQ8sUuGPVJzg7WB2UoZTDFy:UX1pJoQFIhdbD8Er/mFREUj |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
9fb4b41593572433 |
|
VISUAL
aHash
|
ffff0000000000ff |
|
VISUAL
dHash
|
d42b177979315023 |
|
VISUAL
wHash
|
ffff003c1c1000ff |
|
VISUAL
colorHash
|
12000000e00 |
|
VISUAL
cropResistant
|
0020200000000001,0000002343232303,038494dcdc948403,2997697970b13000 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 2 techniques to evade detection by security scanners and make reverse engineering more difficult.