EN ES PT
Back to Stats

Visual Capture

Screenshot of mail.info-portall.ru

Detection Info

http://mail.info-portall.ru/page?token=337e2fb6f6312be97d20dd50b97154d928163622c58f77a631a6cb16acc87092&isfromlink=true
Detected Brand
Outlook
Country
International
Confidence
100%
HTTP Status
200
Report ID
22f1e0fa-f6a…
Analyzed
2025-12-24 20:42
Final URL (after redirects)
https://mail.info-portall.ru/page?token=337e2fb6f6312be97d20dd50b97154d928163622c58f77a631a6cb16acc87092&isfromlink=true

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1CC51E060D01AEC335113E1E8ABD0AF9F3587C715C686294967B483AD1AF3C4DDFA662C
CONTENT ssdeep
48:CVNhzJz9uT4NyJbaIncja26CzXAPDQzuTWTdTXMD5yPBLP5u61dA:ALz9u/baIncebCKDQzuTWFXMtsFxXdA

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
83f67e09890999fc
VISUAL aHash
3f3f3f3f3f3f3f3f
VISUAL dHash
d0ccccddd0d0d0d0
VISUAL wHash
3f27373f3f0f0000

Code Analysis

Risk Score 100/100
Threat Level CRITICAL
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing attack
• Target: Outlook users
• Method: Fake login form stealing username and password
• Exfil: Unknown data exfiltration method
• Indicators: Brand impersonation, domain mismatch, non-official domain
• Risk: HIGH - Immediate credential theft
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.