EN ES PT
Back to Stats

Visual Capture

Screenshot of outlook-office365.mgamt.com

Detection Info

https://outlook-office365.mgamt.com/landing/form/18e77f9c-cdb4-4871-bc7b-c50a9fe8e37d
Detected Brand
Microsoft
Country
International
Confidence
95%
HTTP Status
200
Report ID
502f3150-31a…
Analyzed
2026-01-19 12:19

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T17641A81CD2010346E357EE90F962FBD666140BC0C7134A7C6AB9927AB1CE17553723CD
CONTENT ssdeep
48:n0i0Hls5hwhjO7c2ZgV0jxJF0jIPcU85D4c5hkj0:nfjhh7xg6jxJqjJTt4g5

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
9cc97326cc99d98c
VISUAL aHash
0000181818180000
VISUAL dHash
6171333232327c78
VISUAL wHash
1818181c1f1f1fff
VISUAL colorHash
070000001c0
VISUAL cropResistant
6171333232327c78

Code Analysis

Risk Score 50/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing kit
• Target: Microsoft users
• Method: Fake login form stealing email/phone/Skype and password
• Exfil: Unknown, likely sent to attacker's server
• Indicators: Domain mismatch, unofficial branding, login form
• Risk: HIGH - Immediate credential theft
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.