EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

https://www.mercadolibre.com.uy/gz/account-verification?go=https%3A%2F%2Flistado.mercadolibre.com.uy%2Fcomputacion%2Flaptops-accesorios%2Frepuestos%2Fbaterias&tid=fd8c72f8-d417-4fb4-b864-3fd34cb1a1ab
Detected Brand
Mercado Libre
Country
Uruguay
Confidence
100%
HTTP Status
200
Report ID
5dd2a644-714…
Analyzed
2026-01-01 05:05

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1D9A131F23898543B27B386DAF0A2A75C70CA5589C442A409C29517FD07D5EE5EDCA32B
CONTENT ssdeep
96:dIVl7PpVi9qb1GmcoGkGcGBavG61GEOG0K1GY4tVM1GYgvfE1TC+/Jr12C+Vra5A:+Vp29s1GmVGkGcGO1GEOGN1GY4ti1GY4

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
f326390cd986f326
VISUAL aHash
000000ffffffffff
VISUAL dHash
8c2849320c10041b
VISUAL wHash
000000dfcfcfc9ff
VISUAL colorHash
07e00000000
VISUAL cropResistant
8c2849320c10041b

Code Analysis

Risk Score 94/100
Threat Level BAJO
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Potential credential harvesting attempt
• Target: Mercado Libre users in Uruguay
• Method: Redirecting users to a login page
• Exfil: Unknown, likely aims to steal credentials upon submission
• Indicators: Generic login page, although domain seems legit
• Risk: LOW - Requires user interaction and credential submission

🔒 Obfuscation Detected

  • atob
  • fromCharCode
  • base64_strings

🎯 Kit Endpoints

  • https://www.mercadolibre.com/jms/mlu/lgz/login?platform_id=ml&go=https://listado.mercadolibre.com.uy/computacion/laptops-accesorios/repuestos/baterias&loginType=negative_traffic

📡 API Calls Detected

  • POST
  • PUT
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.