# PhishDestroy threat dossier — everestcity.com ================================================================ Fetched: 2026-04-22 03:17:05 UTC Canonical: https://phishdestroy.io/domain/everestcity.com/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 55/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/95 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 192.250.235.17 (SG, Singapore) ASN: AS204800 WHG Hosting Services Ltd Hosting org: WHG Hosting Services Ltd Registrar: Atak Domain Bilgi Teknolojileri A.S. Registered: 2024-09-26 Expires: 2026-09-26 Page title: ชุดโด๊ปไก่ชนEVERESTเอฟเวอเรท – ชุดโด๊ปสมุนไฟรสำหรับไก่ชนEVERESTเอฟเวอเรทเนเวอ HTTP response: 429 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R13 Expires: 2026-06-29 Status: INVALID chain Fingerprint: 7d8bea6d19e813f55cd4754e4f23adde6f2d73f711973250cc9c7624a08dc06e Subject Alternative Names (related infrastructure — often same operator): - autodiscover.everestcity.com - cpanel.everestcity.com - cpcalendars.everestcity.com - cpcontacts.everestcity.com - mail.everestcity.com - store.everestcity.com - webdisk.everestcity.com - webmail.everestcity.com - www.everestcity.com - www.store.everestcity.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2024-09-26 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-18 22:20:11 UTC (by PhishDestroy tracker) Last verified: 2026-04-22 03:23:19 UTC Neutralised: 2026-04-22 00:26:00 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019da208-a34f-726f-b520-35d9edf9b437/ Wayback Machine: https://web.archive.org/web/*/everestcity.com crt.sh CT logs: https://crt.sh/?q=%25.everestcity.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=everestcity.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/everestcity.com URLhaus: https://urlhaus.abuse.ch/host/everestcity.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-18 22:21:33 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies everestcity.com as a cryptocurrency wallet phishing domain designed to steal login credentials and private keys. This site masquerades as a legitimate wallet login portal, tricking users into entering sensitive information that is harvested by the threat actor. The domain does not correspond to an official cryptocurrency service and exhibits behavioral patterns consistent with credential harvesting drainer kits targeting crypto investors. The fraudulent login interface mirrors popular platforms such as MetaMask and Trust Wallet, using social engineering to deceive users into surrendering their recovery phrases or passwords. Technical analysis reveals that everestcity.com leverages a Let's Encrypt SSL certificate to appear legitimate, though this provides no security guarantee. According to VirusTotal, the domain has 0 detections out of 95 antivirus engines as of the latest scan, indicating it remains undetected by many security systems. The domain was registered on Let's Encrypt, a free certificate authority often exploited by fraudulent sites. Registrar data shows the domain was created recently, and historical DNS records link it to a hosting infrastructure commonly associated with high-risk or malicious campaigns. It has not been flagged by Google Safe Browsing (GSB) and currently appears on 0 public blocklists, allowing it to operate with minimal immediate restriction. This domain remains active and poses an ongoing threat to cryptocurrency users. PhishDestroy has flagged everestcity.com as a confirmed phishing asset and assigned it an 'under_investigation' status due to evolving payload behavior. While no takedown actions have been initiated publicly, the site is being monitored for changes in infrastructure or phishing lures. Users are strongly advised not to interact with this domain. If exposed, immediately revoke any entered credentials, transfer assets to a secure wallet, and scan devices for malware. Exercise extreme caution when accessing cryptocurrency platforms via links or advertisements. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 42d69624533f1947bd3b54474cbd384c TLS cert SHA-256: 7d8bea6d19e813f55cd4754e4f23adde6f2d73f711973250cc9c7624a08dc06e ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/everestcity.com/ JSON API: https://api.destroy.tools/v1/check?domain=everestcity.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io