EN ES PT
Back to Stats

Visual Capture

Screenshot of ln.run

Detection Info

https://ln.run/iALGM
Detected Brand
Kakao
Country
Korea
Confidence
100%
HTTP Status
200
Report ID
dec581e8-b40…
Analyzed
2026-01-18 06:49
Final URL (after redirects)
https://cosmoslifters.com/kr/korea/index.html

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1DF21E021583E897779C28AFC71D9B21D22DAC606CF530D1256FA83ED1AD2E9FCC65284
CONTENT ssdeep
24:iCOgecuDfjYHMC117rV/vt/iU8PDNbNxPFYT0zmaHWhLS:McCbYp17dBiU0NbjPFYT0zmaQG

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
99cc663399cc6633
VISUAL aHash
0000181818000000
VISUAL dHash
200c32b2b2281400
VISUAL wHash
0f0f1b1b1b1b0303
VISUAL colorHash
070000001c0
VISUAL cropResistant
200c32b2b2281400

Code Analysis

Risk Score 68/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing kit
• Target: Kakao users in Korea
• Method: Fake login form stealing email and password
• Exfil: Data sent to unknown server
• Indicators: Domain mismatch, obfuscated JavaScript
• Risk: HIGH - Immediate credential theft

🔒 Obfuscation Detected

  • fromCharCode
😰
"I Never Thought It Would Happen to Me"
That's what 2.3 million victims say every year. Don't wait to become a statistic.