Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T12662C8B5B609053B316346CAF581E388609EC20CDA47B4C9D9F503F856CEEAE6C9E747 |
|
CONTENT
ssdeep
|
192:QQ+FV4WeHUNkfMUaEWQuqwf8Sy9g8y2+z:QJHve0PUan1Avsz |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec6c1b1b1b436764 |
|
VISUAL
aHash
|
00fff3ffffffffff |
|
VISUAL
dHash
|
3816a61032000000 |
|
VISUAL
wHash
|
0081e3c30f3fff00 |
• Threat: Credential harvesting phishing attack.
• Target: Mercado Libre users.
• Method: Fake login page hosted on a proxy service to steal email and password.
• Exfil: Likely a custom API or bot to capture and store credentials.
• Indicators: Domain mismatch (nodeunblocker.net vs mercadolibre.com), served through a proxy, login form.
• Risk: HIGH - Credentials stolen directly from the login form.
Pages with identical visual appearance (based on perceptual hash)
Found 8 other scans for this domain