EN ES PT
Back to Stats
68 Risk Score

Medium Risk

Threat Level: ALTO • Impersonating: Microsoft
  • • Threat: Credential harvesting phishing kit
  • • Target: Microsoft users globally
  • • Method: Fake login form stealing email, phone, or Skype credentials
  • • Exfil: Potential data exfiltration via obfuscated JavaScript
  • • Indicators: Domain mismatch, obfuscation detected, unrelated domain
  • • Risk: HIGH - Immediate credential theft

⚠ Risk Factors

  • Brand impersonation of Microsoft on non-official domain
  • Contains 1 credential harvesting form(s)
  • Credential harvesting indicators detected

Visual Capture

Screenshot of inner.website

Detection Info

https://inner.website/p6395e104ha23c401428bc1e97113f9b5e62.html
Detected Brand
Microsoft
Country
International
Confidence
95%
HTTP Status
200
Report ID
c18fc4d3-026…
Analyzed
2026-01-09 14:13

Content Hashes (HTML Similarity)

Used to detect similar phishing pages based on HTML content

Algorithm Hash Value
CONTENT TLSH
T1B5D100316040AD3712D3C6D8B3B56B1B3385C205DE8757AA97E8C39E4EFBE61CC19292
CONTENT ssdeep
96:qvWFAzQgIeu0nPK/AmvUAK5KbdPs/l+veRzKDafEAD9NltZdSsTZS4h5QQOGAM2B:3gI0/lnRWDeZ9NVhh5UEIf

Visual Hashes (Screenshot Similarity)

Used to detect visually similar phishing pages based on screenshots

Algorithm Hash Value
VISUAL pHash
9c497326cc99d966
VISUAL aHash
180018181d1f1f9f
VISUAL dHash
7161713325727d38
VISUAL wHash
191818181f1f1fff
VISUAL colorHash
07000000180
VISUAL cropResistant
7161713325727d38

Code Analysis

Risk Score 68/100
Threat Level ALTO
⚠️ Phishing Confirmed
🎣 Credential Harvester

🔬 Threat Analysis Report

• Threat: Credential harvesting phishing kit
• Target: Microsoft users globally
• Method: Fake login form stealing email, phone, or Skype credentials
• Exfil: Potential data exfiltration via obfuscated JavaScript
• Indicators: Domain mismatch, obfuscation detected, unrelated domain
• Risk: HIGH - Immediate credential theft

🔒 Obfuscation Detected

  • atob