EN ES PT
Back to Stats
100 Risk Score

High Risk

Threat Level: ALTO • Impersonating: KakaoMail

⚠ Risk Factors

  • Brand impersonation of KakaoMail on non-official domain
  • Contains 5 form(s) with JavaScript submission
  • JavaScript obfuscation detected (7 patterns)
  • Credential harvesting indicators detected
  • OTP/2FA stealing indicators detected

Visual Capture

Screenshot of ysuuasycgucgc.weebly.com

Detection Info

https://ysuuasycgucgc.weebly.com/
Detected Brand
KakaoMail
Country
Unknown
Confidence
100%
HTTP Status
200
Report ID
53c5e402-491…
Analyzed
2026-01-11 04:02

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T177E124E0D054ED3B535386E4B7B57B0F77A5C345CB020D5853F893AB5BCACA0CA229A9
CONTENT ssdeep
96:nkdbH+zH0XfeGnNYXZtGQFYiXsHFKyX3z/1YmVYSZ6QsR:kdbH+zH0X1nktGF5z9rL6Q6

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
e3e30ccccc66a633
VISUAL aHash
ffffe7ffffff0000
VISUAL dHash
040c0c0c00000000
VISUAL wHash
c3c3c3c3ffff0000
VISUAL colorHash
07000038000
VISUAL cropResistant
040c0c0c00000000

Code Analysis

Risk Score 100/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester 🎣 OTP Stealer 🎣 Card Stealer 🎣 Banking 🎣 Personal Info

🔐 Credential Harvesting Forms

🔒 Obfuscation Detected

  • atob
  • eval
  • fromCharCode
  • unescape
  • hex_escape
  • unicode_escape
  • base64_strings

Scan History for ysuuasycgucgc.weebly.com

Found 1 other scan for this domain