EN ES PT
Back to Stats

Visual Capture

Screenshot of login.auth-session-login.com

Detection Info

https://login.auth-session-login.com/?keyname=Qgau0Wb
Detected Brand
Microsoft
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
270379a7-ba9…
Analyzed
2026-04-08 22:35

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T19C81B8717480213F12C7C5E9B3F2B641B7A8C50EF5090F7969AD12AE3DCBF15A962700
CONTENT ssdeep
48:TVogHPVE0e7OkeUkxIez5yjvl5Zpbqx1h7lWNWk7j63eqML73U47I3eqPQ7AANcT:TVoCVkeUb2wvz3W946CLc/Q+

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
9c697326cc99d926
VISUAL aHash
000018191b1f0f1e
VISUAL dHash
100d333333327cf8
VISUAL wHash
00011b1f1f1f3f7e
VISUAL colorHash
07000000180
VISUAL cropResistant
100d333333327cf8

Code Analysis

Risk Score 65/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 Banking

📊 Risk Score Breakdown

Total Risk Score
100/100

Contributing Factors

Active Phishing Kit
Detected kit types: Credential Harvester, Banking
Credential Harvesting
Credential harvesting detected with 1 form(s) capturing sensitive data

🔬 Comprehensive Threat Analysis

Threat Type
Banking Credential Harvester
Target
Microsoft users
Attack Method
credential harvesting forms
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
HIGH - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

⚠️ Indicators of Compromise

  • Kit types: Credential Harvester, Banking

🏢 Brand Impersonation Analysis

Impersonated Brand
Microsoft
Official Website
https://www.microsoft.com
Fake Service
Account login portal

⚔️ Attack Methodology

Primary Method: Credential Harvesting

Victim enters username and password into fake login form. Credentials are captured via JavaScript and exfiltrated to attacker's server in real-time.

Secondary Method: Client-Side Form Interception

JavaScript intercepts form submissions before they reach the fake backend. This allows real-time credential harvesting and validation without server round-trips.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
login.auth-session-login.com
Registered
2022-05-24 19:43:20+00:00
Registrar
Amazon Registrar, Inc.
Status
Active (older domain)

Hosting Information

Provider
Amazon Registrar, Inc.
ASN

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.