Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1CA5395B06E580D7E968387D7DBD23FD572A994D7E20246E4F3E44A4C0EC2C6CC9CA295 |
|
CONTENT
ssdeep
|
768:1yi+raFRXfAp8pSkbkY3qAtIhYvWoJ449cU:1ppIhYvWxLU |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bb193dc1c1e5c4ca |
|
VISUAL
aHash
|
af8d9dc1cde78187 |
|
VISUAL
dHash
|
5b39290b190c2b2b |
|
VISUAL
wHash
|
bb8d8f81c5878387 |
|
VISUAL
colorHash
|
07e00008008 |
|
VISUAL
cropResistant
|
5b39290b190c2b2b |
Victim is prompted for 2FA code after entering credentials. The code is intercepted and used by attacker to access victim's account in real-time.
Malicious code is obfuscated using 132 techniques to evade detection by security scanners and make reverse engineering more difficult.
Pages with identical visual appearance (based on perceptual hash)