Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16D63BE26B2402D37801753C0EBB643675261C748DE061F55139CC3BBBAEFA78EE166AC |
|
CONTENT
ssdeep
|
1536:UUQfWnpQVnkpX1HZXMDcwuMRlu07KhWwCrC4S:k+n6NYTocwLluS6x |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
cbc33c33762cdd20 |
|
VISUAL
aHash
|
2c3c3c3c2c3c0101 |
|
VISUAL
dHash
|
c9c9e9e1c9e9b3fb |
|
VISUAL
wHash
|
3c7c7c7c7c7c0301 |
|
VISUAL
colorHash
|
07000000183 |
|
VISUAL
cropResistant
|
939b868ea31b9be0,aa8e86d6aa36de88,c9c9e9e1c9e9b3fb,8a15b4d031431418,f9f9300a1a1a1a08 |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 30 techniques to evade detection by security scanners and make reverse engineering more difficult.