EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

https://www.mercadolibre.com.uy/gz/account-verification?go=https%3A%2F%2Flistado.mercadolibre.com.uy%2Fcomputacion%2Fcomponentes-pc%2Fprocesadores%2Fpentium%2Fusado%2F&tid=89532616-f952-41cf-a564-780953561983
Detected Brand
Mercado Libre
Country
Uruguay
Confidence
100%
HTTP Status
200
Report ID
0c3d8f15-197…
Analyzed
2026-01-17 12:16

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T11FA131E23499453E37F786DAF0A2975830CAA589C442B408D69517FD0BC9EA5ECCD32F
CONTENT ssdeep
96:M6aVei/KbI0fVWQAXZ2k8lcI3rIbeb1GmcoGkGcGBavG61GEOG0K1GY4tVM1GYga:dbWQ4ZLscIF1GmVGkGcGO1GEOGN1GY4I

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
f326390cd986f326
VISUAL aHash
000000ffffffffff
VISUAL dHash
8c2849320c10041b
VISUAL wHash
000000fffcfce1ff
VISUAL colorHash
07e00000000
VISUAL cropResistant
8c2849320c10041b

Code Analysis

Risk Score 79/100
Threat Level BAJO
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Potential data collection (email, password)
• Target: Mercado Libre users in Uruguay
• Method: Standard login/signup page on the official website
• Exfil: Unknown, depends on form submission
• Indicators: Official website, standard login page
• Risk: LOW - Standard data collection on official site

🔒 Obfuscation Detected

  • atob
  • unescape
  • base64_strings

🎯 Kit Endpoints

  • https://www.mercadolibre.com/jms/mlu/lgz/login?platform_id=ml&go=https://listado.mercadolibre.com.uy/computacion/componentes-pc/procesadores/pentium/usado/&loginType=negative_traffic

📡 API Calls Detected

  • inPrivate
  • PUT
  • POST
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.