EN ES PT
Back to Stats

Visual Capture

Screenshot of www.microsoft-clone.vercel.app

Detection Info

http://www.microsoft-clone.vercel.app/
Detected Brand
Microsoft
Country
International
Confidence
95%
HTTP Status
200
Report ID
53ef9f92-885…
Analyzed
2026-02-18 01:22
Final URL (after redirects)
https://microsoft-clone.vercel.app/

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1F1D1BF623084713B47D3739EBD14B79DE39B41A78B2A0F0165B5590FAEA3B4ACC011AF
CONTENT ssdeep
96:nZpEFuPyTl3ZTOwCQPfF9jinPk+M8kq4PJn9vKraLz2E1X:ZvApTy+fvqk+MxJFvz5Z

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
ec93649b3cc3c32c
VISUAL aHash
e7c3e38383fff3d1
VISUAL dHash
2f0f0f2b370a2727
VISUAL wHash
c7c3c38383e3d1d1
VISUAL colorHash
07401200000
VISUAL cropResistant
2f0f0f2b370a2727,cced7c7e38de3f1e,2734050c9c2d2a5c

Code Analysis

Threat Level ALTO
⚠️ Phishing Confirmed

🔬 Threat Analysis Report

• Threat: Impersonation
• Target: Microsoft users
• Method: Mimicking the official website
• Exfil: Unknown, likely credential harvesting or malware distribution.
• Indicators: Microsoft logo, free hosting, design mimicry.
• Risk: High

📊 Risk Score Breakdown

Total Risk Score
90/100

Contributing Factors

Free Hosting + Brand Logo
The use of a brand logo on a free hosting service (vercel.app) is a strong indicator of phishing.
Impersonation
The website attempts to mimic the appearance of a legitimate Microsoft website.

🔬 Comprehensive Threat Analysis

Threat Type
Microsoft Phishing Landing Page
Target
Microsoft users (International)
Attack Method
Brand impersonation
Exfiltration Channel
Form submission (backend endpoint not detected - likely JavaScript-based)
Risk Assessment
LOW - Automated credential harvesting with Form submission (backend endpoint not detected - likely JavaScript-based)

🏢 Brand Impersonation Analysis

Impersonated Brand
Microsoft
Official Website
www.microsoft.com
Fake Service
Microsoft's product offerings.

⚔️ Attack Methodology

Primary Method: Brand Impersonation

The attacker is trying to impersonate Microsoft by copying the website design and using the Microsoft logo to lure users into providing credentials or downloading malware.

Secondary Method: Credential Harvesting / Malware distribution

The goal is to steal login details or infect the victim's device with malware, likely through links to a phishing page or by malicious downloads.

🌐 Infrastructure Indicators of Compromise

Domain Information

Domain
www.microsoft-clone.vercel.app
Registered
None
Registrar
None
Status
None

🤖 AI-Extracted Threat Intelligence

😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.