# PhishDestroy threat dossier — binance-express.com ================================================================ Fetched: 2026-04-21 14:47:15 UTC Canonical: https://phishdestroy.io/domain/binance-express.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 82/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Binance ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/95 security vendors flagged this domain URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 176.123.1.175 (MD, Chisinau) ASN: AS200019 ALEXHOST SRL Hosting org: Alexhost SRL Registrar: Fewmoretaps OU d/b/a Trustname.com !!! REGISTRAR INTEGRITY ALERT — Trustname / Fewmoretaps OU !!! Trustname (IANA #4318) is a shell company declaring EUR 120 annual revenue, 1 employee, negative equity, Belarusian ownership. Explicitly advertises itself as 'bulletproof' in its DNS TXT records. Primary source: https://phishdestroy.io/trustname-bulletproof-exposed Nameservers: ares.trustname.com, ns1.anycastdns.cz, ns2.anycastdns.cz, zeus.trustname.com Registered: 2026-04-13 Page title: 币安官网 - 全球领先的数字资产交易平台 HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-12 Status: INVALID chain Fingerprint: 7e02e94ac842b7e3bc86b54b397791260594a3024c39349ef367891b2433a73b Subject Alternative Names (related infrastructure — often same operator): - www.binance-express.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-13 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-21 13:06:20 UTC (by PhishDestroy tracker) First reported: 2026-04-21 10:11:20 UTC (abuse notice filed) Last verified: 2026-04-21 17:32:09 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019daf7e-d763-7347-8bfb-0b19a46cd510/ URLQuery: https://urlquery.net/report/b4b13da4-d1b3-4800-8fe4-e1af32041ae8 Wayback Machine: https://web.archive.org/web/*/binance-express.com crt.sh CT logs: https://crt.sh/?q=%25.binance-express.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=binance-express.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/binance-express.com URLhaus: https://urlhaus.abuse.ch/host/binance-express.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-21 13:09:05 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies active brand impersonation tied to domain binance-express.com, which mimics Binance’s official site under the title 币安官网 - 全球领先的数字资产交易平台. The page employs crypto drainer functionality to harvest wallet credentials and initiate unauthorized transfers. This campaign leverages a spoofed digital asset exchange interface to trick users into connecting compromised wallets, resulting in asset exfiltration. The domain’s registration date and SSL provider (Let’s Encrypt) suggest a hastily deployed operation aimed at capitalizing on Binance’s global user base. This domain exhibits several distinct technical indicators. VirusTotal shows a clean score of 0/95 detections as of current scans, indicating evasion of mainstream security engines. It was registered on April 13, 2026 via Fewmoretaps OU d/b/a Trustname.com, and resolves to IP address 176.123.1.175. Google Safe Browsing has not yet flagged the domain, and no listings were found on major blocklists. These metrics indicate a newly active threat with low visibility and limited containment. The campaign remains active as of the last scan, with no signs of takedown or mitigation. While domain age is minimal, the drainer kit is operational, posing immediate risk to users who access the fake login portal. PhishDestroy recommends immediate blocking of the domain and associated IP. Users should verify all Binance-related URLs using PhishDestroy’s verification tool before entering credentials or connecting wallets. Remaining risk is assessed as high due to live drainer functionality and low detection rate — proactive blocking is essential to prevent asset loss. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260421-7BEC55 Favicon MD5: 4e7d2343939ad9980909148d2052afac TLS cert SHA-256: 7e02e94ac842b7e3bc86b54b397791260594a3024c39349ef367891b2433a73b ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/binance-express.com/ JSON API: https://api.destroy.tools/v1/check?domain=binance-express.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io