# PhishDestroy threat dossier — cobaia.minutepays.app ================================================================ Fetched: 2026-05-14 16:11:46 UTC Canonical: https://phishdestroy.io/domain/cobaia.minutepays.app/ ## VERDICT ---------------------------------------------------------------- STATUS STALE — last probed 31 days ago, treat as ACTIVE until re-verified Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 6/94 security vendors flagged this domain Flagging vendors: ADMINUSLabs, CyRadar, ESET, Fortinet, Google Safebrowsing, SOCRadar Public blocklists: listed on 3 independent blocklists Google Safe Browsing: FLAGGED ## INFRASTRUCTURE ---------------------------------------------------------------- Registered: 2026-03-10 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-03-10 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-03-10 16:30:02 UTC (by PhishDestroy tracker) Last verified: 2026-04-12 19:40:28 UTC (STALE — 31 days ago, re-verify) Flagged dead: 2026-03-11 01:00:24 UTC (NOT RE-VERIFIED IN 31 DAYS — treat as unconfirmed) Current status: UNCONFIRMED (our live-probe is 31 days stale) ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-03-10 16:40:09 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies cobaia.minutepays.app as a potentially malicious domain exhibiting characteristics consistent with generic phishing attempts. Although it has not been detected by any security vendors to date, the domain's recent creation on March 10, 2026, and its use of a subdomain under minutepays.app warrant a cautious approach. The domain is currently flagged for further investigation due to suspicious activity patterns that align with common phishing tactics designed to deceive users into divulging personal or financial information. From a technical perspective, cobaia.minutepays.app presently shows no detections across 95 security engines on VirusTotal, suggesting it has not yet been incorporated into recognized threat intelligence databases. The domain's infrastructure is minimal, with limited visibility into hosting or registrar details beyond its registration date. This lack of established reputation combined with the generic phishing threat type implies that attackers might be leveraging newly created, low-profile domains to bypass conventional security filters and target unsuspecting users. The domain is active and continues to be monitored closely. PhishDestroy recommends users exercise heightened caution, avoiding interaction with the site or submitting any personal information until further analysis confirms its safety. Organizations should consider adding cobaia.minutepays.app to their internal watchlists and update their threat detection mechanisms to detect potential phishing campaigns associated with this domain. Continuous monitoring is essential as the domain's risk status may evolve with emerging intelligence. ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/cobaia.minutepays.app/ JSON API: https://api.destroy.tools/v1/check?domain=cobaia.minutepays.app Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 149,166 domains (36,810 alive under monitoring, 111,596 confirmed takedowns/dead). Site: https://phishdestroy.io