EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

https://www.mercadolibre.com.uy/gz/account-verification?go=https%3A%2F%2Flistado.mercadolibre.com.uy%2Fcomputacion%2Flaptops-accesorios%2Frepuestos%2Fbaterias%2Fasus%2F_NoIndex_True%3Foriginal_category_landing%3Dtrue&tid=5dc9a4eb-04d1-4295-aa12-5b9c79a0832c
Detected Brand
Mercado Libre
Country
Uruguay
Confidence
100%
HTTP Status
200
Report ID
2ac407c6-2e5…
Analyzed
2026-01-02 02:55

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T16FA133F23498543B27F386E9F0A2A75C70CA5549C442A848C2D517FD0BD5EE5ED8A32F
CONTENT ssdeep
96:dIVlVPpVi9qb1GmcoGkGcGBavG61GEOG0K1GY4tVM1GYgvfE1TC+/Jr12C+Vra56:+VP29s1GmVGkGcGO1GEOGN1GY4ti1GYy

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
f326390cd986f326
VISUAL aHash
000000ffffffffff
VISUAL dHash
8c2849320c10041b
VISUAL wHash
000000fffcfce1ff
VISUAL colorHash
07e00000000
VISUAL cropResistant
8c2849320c10041b

Code Analysis

Risk Score 94/100
Threat Level BAJO
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Potential data tracking with cookies
• Target: Mercado Libre users in Uruguay
• Method: Website uses cookies to enhance user experience
• Exfil: No exfiltration detected
• Indicators: Use of cookies, privacy policy link
• Risk: LOW - Standard cookie usage practices

🔒 Obfuscation Detected

  • atob
  • fromCharCode
  • base64_strings

🎯 Kit Endpoints

  • https://www.mercadolibre.com/jms/mlu/lgz/login?platform_id=ml&go=https://listado.mercadolibre.com.uy/computacion/laptops-accesorios/repuestos/baterias/asus/_NoIndex_True?original_category_landing=true&loginType=negative_traffic

📡 API Calls Detected

  • POST
  • PUT
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.