EN ES PT
Back to Stats

Visual Capture

Screenshot of nmnnegi.github.io

Detection Info

http://nmnnegi.github.io/amazon-clone
Detected Brand
Amazon
Country
USA
Confidence
95%
HTTP Status
200
Report ID
23b03e11-c30…
Analyzed
2026-03-12 03:21
Final URL (after redirects)
https://nmnnegi.github.io/amazon-clone/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1CC819C704042BA3701E7C3D5EF39A75F72D88298EA83670943F4C38C9ADAE5EDD61910
CONTENT ssdeep
96:TVQoJJoDDDNozVPUmy32e1JmkofRbCCUs0s0s0stgKt:acJoYv/Os0s0s0stgKt

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
8e19394f5ed04d4e
VISUAL aHash
00030ffe30b1ffff
VISUAL dHash
72dbdbe46565a955
VISUAL wHash
000303f630b1ffff
VISUAL colorHash
07207000000
VISUAL cropResistant
8282e2eaeae28282,5bdfbc646565a955,62f39adbdbdfc79c,36b49a1a1b1d2c2c,4c9eb33276657d59,adccd9b3b7b7beb6,616d6c5e3e7e7c7c,1d06028686069a9a

Code Analysis

Threat Level ALTO
⚠️ Phishing Confirmed

🔬 Threat Analysis Report

• Threat: Phishing
• Target: Amazon customers
• Method: Impersonation through a look-alike website on free hosting.
• Exfil: Likely aims to steal login credentials or other sensitive information.
• Indicators: Free hosting, Amazon branding.
• Risk: High

📊 Risk Score Breakdown

Total Risk Score
95/100

Contributing Factors

Free Hosting
The site is hosted on free hosting, a common indicator of phishing.
Brand Impersonation
The website closely mimics the visual appearance of Amazon.
Domain Suspicion
Unrelated domain used to display brand (nmnnegi.github.io)

🔬 Comprehensive Threat Analysis

Threat Type
Amazon Phishing Landing Page
Target
Amazon users (USA)
Attack Method
Brand impersonation
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
LOW - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

🏢 Brand Impersonation Analysis

Impersonated Brand
Amazon
Official Website
https://www.amazon.com
Fake Service
Amazon

⚔️ Attack Methodology

Primary Method: Credential Harvesting

The phishing site is designed to trick users into entering their Amazon login credentials. The user is presented with a fake Amazon interface hosted on free hosting. Once the user enters credentials, the phishers will steal them.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
nmnnegi.github.io
Registered
Unknown
Registrar
GitHub
Status
Active

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.