EN ES PT
Back to Stats
100 Risk Score

High Risk

⚠ Risk Factors

  • JavaScript obfuscation detected (6 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected

Visual Capture

No screenshot available

Detection Info

https://forms.office.com/r/mW5TeXU9hW
Detected Brand
Unknown
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
1e719d25-f79…
Analyzed
2026-01-09 01:33
Final URL (after redirects)
https://forms.office.com/pages/responsepage.aspx?id=DQSIkWdsW0yxEjajBLZtrQAAAAAAAAAAAANAAXZnexVUMllWUlBTNkdUTzFLM1UyNDFMMUQwRlRBVC4u&route=shorturl

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T155C16672556580BF6A0F8EF570BFF29DE1360589CB1A4D12D1AD04E0468DDF58AF3232
CONTENT ssdeep
96:tf0LZfTGCB1kxxYBBsFuGAFpPecRhWmidiwggbE4bEbbEbwbE+bEpYQm1sVJfDfu:90LhTGCB1kxxDFuqmidiwtbE4bEbbEbS

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
b326cc3366cc3333
VISUAL aHash
ffe7e7e7e7e7ffff
VISUAL dHash
00080c0c0c0c0000
VISUAL wHash
3f27272727030f0f
VISUAL colorHash
07000000180
VISUAL cropResistant
00080c0c0c0c0000

Code Analysis

Risk Score 100/100
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Banking 🎣 Personal Info

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • unicode_escape
  • base64_strings