# PhishDestroy threat dossier — getdesktop-ledgr.framer.wiki ================================================================ Fetched: 2026-04-30 09:09:00 UTC Canonical: https://phishdestroy.io/domain/getdesktop-ledgr.framer.wiki/ ## VERDICT ---------------------------------------------------------------- TAKEN DOWN (neutralised) Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: Ledger ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 10/91 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, Cluster25, CRDF, CyRadar, G-Data, Gridinsoft, Kaspersky, LevelBlue, Sophos ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 31.43.160.6 (NL, Amsterdam) ASN: AS16509 Amazon.com, Inc. Hosting org: Framer B.V Registrar: CSC Corporate Domains, Inc. Nameservers: ["ns-1185.awsdns-20.org", "ns-423.awsdns-52.com", "ns-1827.awsdns-36.co.uk", "ns-772.awsdns-32.net"] Registered: 2026-04-27 Page title: Getting™ Started | Ledger® Live: Desktop® — official (EN-us)® HTTP response: 404 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E7 Expires: 2026-07-05 Status: INVALID chain Fingerprint: c6c67669d5d99b4f600ed73994fb59fc88b0b3b827970a47cfeae03a4448bcc8 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: CLOSED — no report required. This domain was neutralised before the abuse-report cycle could be dispatched — either the hosting provider / registrar suspended it on their own, the DNS went dead, or the operator abandoned the infrastructure. PhishDestroy keeps the evidence bundle on file for audit but no formal notice was sent. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-27 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-27 19:20:11 UTC (by PhishDestroy tracker) Last verified: 2026-04-29 19:40:22 UTC Neutralised: 2026-04-29 00:02:24 UTC Current status: taken down (registrar suspended or DNS dead) ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dcfba-21ef-7399-92e1-0d29c5c42ec2/ Wayback Machine: https://web.archive.org/web/*/getdesktop-ledgr.framer.wiki crt.sh CT logs: https://crt.sh/?q=%25.getdesktop-ledgr.framer.wiki Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=getdesktop-ledgr.framer.wiki AlienVault OTX: https://otx.alienvault.com/indicator/domain/getdesktop-ledgr.framer.wiki URLhaus: https://urlhaus.abuse.ch/host/getdesktop-ledgr.framer.wiki/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-27 19:23:18 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies getdesktop-ledgr.framer.wiki as a potentially malicious domain currently under active investigation for generic_phishing activity. This subdomain of framer.wiki appears to impersonate Ledger hardware wallet services, likely deployed as a drainer kit targeting cryptocurrency users. The fraudulent portal is designed to deceive victims into connecting their Ledger wallets and approve malicious token transfer permissions, enabling unauthorized fund extraction. Threat actors are exploiting Framer’s publishing platform to host the fraudulent site, leveraging legitimate infrastructure to bypass traditional security filters while maintaining a facade of credibility through the inclusion of 'Ledger' branding. This domain resolves to IP 31.43.160.6 and utilizes a Let's Encrypt SSL certificate, indicating an attempt to appear legitimate at the transport layer. VirusTotal currently reports 0/95 detections, suggesting the site remains undetected by standard antivirus engines as of this analysis. The domain has not been flagged by Google Safe Browsing (GSB) and has no known presence on major blocklists. WHOIS data indicates recent creation with limited historical presence, which is consistent with tactics used by fraudulent actors to reduce traceability. The site’s reliance on Framer’s publishing infrastructure and the absence of broad detection underscore the potential for delayed discovery and amplified victim reach. As of this report, getdesktop-ledgr.framer.wiki remains active and under investigation with an 'under_investigation' status. PhishDestroy recommends immediate avoidance of any interaction with the domain, including clicking, downloading, or entering credentials. Users who have recently visited the site are advised to disconnect their hardware wallets, revoke any connected app permissions, and scan devices for malware using trusted security software. While current detection rates are low, the domain’s active status and suspicious configuration warrant heightened vigilance. The risk remains elevated as long as the domain remains accessible and undetected by major security platforms. [Updates since narrative was generated:] - VirusTotal detections: now 10/91 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 9e421d0b86bb58ca789f5c62a2e6e973 TLS cert SHA-256: c6c67669d5d99b4f600ed73994fb59fc88b0b3b827970a47cfeae03a4448bcc8 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/getdesktop-ledgr.framer.wiki/ JSON API: https://api.destroy.tools/v1/check?domain=getdesktop-ledgr.framer.wiki Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io