EN ES PT
Back to Stats

Visual Capture

Screenshot of cocorost-556.jp

Detection Info

https://cocorost-556.jp/conference/excel/excel
Detected Brand
Microsoft Excel
Country
International
Confidence
100%
HTTP Status
200
Report ID
16d2e709-cd0…
Analyzed
2026-01-01 12:02
Final URL (after redirects)
https://cocorost-556.jp/conference/excel/excel/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T11F51EA3020549D2B6ADB95E567B8630AA1C0E2C2CB3357052BFC8BDD5ECAC4BCC93685
CONTENT ssdeep
48:nZYlPwgTQ/vxhb2K+h8RVhEdl9sJguNPeHx:naQDiK+WilslNPYx

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
999d666731992666
VISUAL aHash
003c3c3c18000000
VISUAL dHash
9471717170042000
VISUAL wHash
7e7f3c3cbce0e000
VISUAL colorHash
38000000e00
VISUAL cropResistant
e48ccce0c880d0c0,9471717170042000

Code Analysis

Risk Score 73/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing attack
• Target: Microsoft Excel users
• Method: Fake login form is used to steal email and password
• Exfil: Data exfiltration target is unknown, but likely a custom API or email.
• Indicators: Domain does not match the official website, a login form is present.
• Risk: HIGH - Immediate credential theft upon form submission.

🔒 Obfuscation Detected

  • fromCharCode

📡 API Calls Detected

  • POST
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.