EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

http://www.mercadolibre.cl/muneco-de-peluche-duolingo-oscar-duolingo-chess/p/MLC2043563299
Detected Brand
Mercado Libre
Country
International
Confidence
100%
HTTP Status
200
Report ID
2420a9a7-63c…
Analyzed
2026-03-02 12:57
Final URL (after redirects)
https://www.mercadolibre.cl/gz/account-verification?go=https%3A%2F%2Fwww.mercadolibre.cl%2Fmuneco-de-peluche-duolingo-oscar-duolingo-chess%2Fp%2FMLC2043563299&tid=afa830ae-46b4-4a88-9ef0-43e3a34ec766

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1FEA141E27499483E37E386DAF0A2A75830CA9699C451B409C59517FD07D8EA2ECCE31F
CONTENT ssdeep
96:F6aVei0fYI0wVWd4x2k83b3rIjfeb1GmcoGkGcGBavG6NGEOG0K1GY4tVM1GYgvS:BsWd0Leb51GmVGkGcGONGEOGN1GY4tih

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
f326390cd986f326
VISUAL aHash
000000ffffffffff
VISUAL dHash
8c2849320c10041b
VISUAL wHash
000000dbcfcf89ff
VISUAL colorHash
07e00000000
VISUAL cropResistant
8c2849320c10041b

Code Analysis

Risk Score 82/100
Threat Level BAJO
šŸŽ£ Credential Harvester šŸŽ£ OTP Stealer šŸŽ£ Banking

šŸ”¬ Threat Analysis Report

• Threat: Impersonation
• Target: Mercado Libre users
• Method: User interaction to redirect to the correct login page.
• Exfil: No exfiltration detected.
• Indicators: Matching brand elements, Spanish language.
• Risk: Low

šŸ”’ Obfuscation Detected

  • atob
  • fromCharCode
  • unescape
  • base64_strings

šŸŽÆ Kit Endpoints

  • https://www.mercadolibre.com/jms/mlc/lgz/login?platform_id=ml&go=https://www.mercadolibre.cl/muneco-de-peluche-duolingo-oscar-duolingo-chess/p/MLC2043563299&loginType=negative_traffic

šŸ“” API Calls Detected

  • POST
  • inPrivate
  • PUT

šŸ“Š Risk Score Breakdown

Total Risk Score
10/100

Contributing Factors

Domain matches brand
The domain is related to Mercado Libre.
Obfuscation Detected
Obfuscation is often used in phishing attacks

šŸ”¬ Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
Mercado Libre users (International)
Attack Method
Brand impersonation + obfuscated JavaScript
Exfiltration Channel
Unknown
Risk Assessment
CRITICAL - Automated credential harvesting with Unknown

āš ļø Indicators of Compromise

  • Kit types: Credential Harvester, OTP Stealer, Banking
  • 6 obfuscation techniques

šŸ¢ Brand Impersonation Analysis

Impersonated Brand
Mercado Libre
Official Website
www.mercadolibre.cl
Fake Service
Login Portal

āš”ļø Attack Methodology

Primary Method: Impersonation

The site appears to be impersonating Mercado Libre, however, the brand elements are consistent. Further checks needed for the URL

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
www.mercadolibre.cl
Registered
2000-05-17 21:30:43+00:00
Registrar
None
Status
ACTIVE

šŸ¤– AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.