Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T15212A979734D33310AF302D6711D07FA675BB8A8D333156868ECC16993A1FA187A27E5 |
|
CONTENT
ssdeep
|
192:QTzXslhu34YNKAt9GUTMeM5KMGlZuTiWzUIWmmC/B6:QfsKxwqZc12+1R7mC/o |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
c6c4633979329ec6 |
|
VISUAL
aHash
|
007e7e183c18003c |
|
VISUAL
dHash
|
8ef0e0b0f0b2c861 |
|
VISUAL
wHash
|
007e7e3c7e183c3c |
|
VISUAL
colorHash
|
38000000007 |
|
VISUAL
cropResistant
|
8ef0e0b0f0b2c861 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 6 techniques to evade detection by security scanners and make reverse engineering more difficult.