EN ES PT
Back to Stats
68 Risk Score

Medium Risk

Threat Level: ALTO • Impersonating: Microsoft
  • • Threat: Credential harvesting phishing kit
  • • Target: Microsoft users
  • • Method: Fake login form stealing email, phone, or Skype credentials
  • • Exfil: Potential data exfiltration via obfuscated JavaScript
  • • Indicators: Domain mismatch, obfuscation detected, form present
  • • Risk: HIGH - Immediate credential theft

⚠ Risk Factors

  • Brand impersonation of Microsoft on non-official domain
  • Contains 1 credential harvesting form(s)
  • Credential harvesting indicators detected

Visual Capture

Screenshot of inner.website

Detection Info

https://inner.website/y023e62ecc47bd45efl8a100d2888677a163.html
Detected Brand
Microsoft
Country
International
Confidence
95%
HTTP Status
200
Report ID
7dbaf205-042…
Analyzed
2026-01-09 14:20

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T168D1113160409D3712C3C6C8B3B56B1B3784C205DE8757AA57E8C39D4EFBE61CC19292
CONTENT ssdeep
96:qvWFAzQgIeu0nPK/AmvUAK5KbdPs/l+veRzKDafEAD9NltZdSsTZS4C5QQOGAM2B:3gI0/lnRWDeZ9NVhC5UEIf

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
9c497326cc99d966
VISUAL aHash
180018181d1f1f9f
VISUAL dHash
7161713325727d38
VISUAL wHash
191818181f1f1fff
VISUAL colorHash
07000000180
VISUAL cropResistant
7161713325727d38

Code Analysis

Risk Score 68/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing kit
• Target: Microsoft users
• Method: Fake login form stealing email, phone, or Skype credentials
• Exfil: Potential data exfiltration via obfuscated JavaScript
• Indicators: Domain mismatch, obfuscation detected, form present
• Risk: HIGH - Immediate credential theft

🔒 Obfuscation Detected

  • atob