EN ES PT
Back to Stats

Visual Capture

No screenshot available

Detection Info

https://www.mercadolibre.com.uy/gz/account-verification?go=https%3A%2F%2Flistado.mercadolibre.com.uy%2Fcomputacion%2Fcomponentes-pc&tid=98f71b43-dd9d-4bb4-aeec-9a54b1559578
Detected Brand
Mercado Libre
Country
Uruguay
Confidence
100%
HTTP Status
200
Report ID
6cd44454-694…
Analyzed
2026-01-01 05:20

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T159A143F23498593A27F386DAF0A2A75C70CA5549C442A408C2D517FE07D5EE5EDCA32F
CONTENT ssdeep
96:dIVlpppVi9qb1GmcoGkGcGBavG61GEOG0K1GY4tVM1GYgvfE1TC+/Jr12C+Vra5C:+Vl29s1GmVGkGcGO1GEOGN1GY4ti1GYa

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
f326390cd986f326
VISUAL aHash
000000ffffffffff
VISUAL dHash
8c2849320c10041b
VISUAL wHash
000000fff0f0f1ff
VISUAL colorHash
07e00000000
VISUAL cropResistant
8c2849320c10041b

Code Analysis

Risk Score 86/100
Threat Level BAJO
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔬 Threat Analysis Report

• Threat: Potential data collection
• Target: Mercado Libre users in Uruguay
• Method: Asks user to enter account through a login screen
• Exfil: Not present, generic login page, no form data collected.
• Indicators: Uses official domain, standard branding. However, possible data collection via cookies.
• Risk: LOW - Potential for data collection, but not a confirmed scam

🔒 Obfuscation Detected

  • atob
  • base64_strings

🎯 Kit Endpoints

  • https://www.mercadolibre.com/jms/mlu/lgz/login?platform_id=ml&go=https://listado.mercadolibre.com.uy/computacion/componentes-pc&loginType=negative_traffic

📡 API Calls Detected

  • PUT
  • POST
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.