# PhishDestroy threat dossier — m.galabetyenigirisadresi.com ================================================================ Fetched: 2026-04-30 07:27:51 UTC Canonical: https://phishdestroy.io/domain/m.galabetyenigirisadresi.com/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 14/91 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, Cluster25, CRDF, Forcepoint ThreatSeeker, Fortinet, G-Data, Gridinsoft, Kaspersky, Lionic, Seclookup, SOCRadar, Sophos URLQuery: 2 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 104.21.77.180 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: Dynadot Inc Nameservers: ["alaric.ns.cloudflare.com", "demi.ns.cloudflare.com"] Registered: 2026-04-27 Page title: Galabet Giriş 2026 | Güncel Adres & Bonus Fırsatları HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / E8 Expires: 2026-07-25 Status: INVALID chain Fingerprint: 1ccb6fdeebc43740f33b0c760051ada5df1a6d476095c25360269cc22fa1bc03 Subject Alternative Names (related infrastructure — often same operator): - galabetyenigirisadresi.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-27 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-27 15:15:40 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-04-27 12:16:15 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-30 09:41:10 UTC Current status: ACTIVE / observable Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019dcedc-2ef2-731e-9e78-7e7cc1f23d2c/ URLQuery: https://urlquery.net/report/65ed20f0-4db4-49be-9ed6-827272b227fe Wayback Machine: https://web.archive.org/web/*/m.galabetyenigirisadresi.com crt.sh CT logs: https://crt.sh/?q=%25.m.galabetyenigirisadresi.com Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=m.galabetyenigirisadresi.com AlienVault OTX: https://otx.alienvault.com/indicator/domain/m.galabetyenigirisadresi.com URLhaus: https://urlhaus.abuse.ch/host/m.galabetyenigirisadresi.com/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-27 15:16:07 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies m.galabetyenigirisadresi.com as a generic phishing domain currently under active investigation for its role in crypto drainer campaigns. This subdomain mimics legitimate Turkish financial institutions, leveraging deceptive naming to trick users into exposing wallet credentials or approving fraudulent transaction approvals. The site operates as a drainer kit, with no known ties to established brands beyond opportunistic impersonation of regional financial entities. The domain’s masked URL (m.galabetyenigirisadresi.com) suggests a mobile-focused phishing strategy targeting users on mobile devices. This domain exhibits a high-risk technical profile: it remains undetected by VirusTotal (0/95 engines as of seed a69849), is registered through Dynadot Inc, and resolves to IP 104.21.77.180 via a Let’s Encrypt SSL certificate. Its creation date of April 26, 2026, indicates recent deployment—a red flag for fresh phishing infrastructure. Google Safe Browsing (GSB) has not yet flagged it, and no known blocklists include this IP or domain, allowing continuous exposure to potential victims. The combination of low detection, recent registration, and Turkish-language branding strongly suggests targeted phishing. While under investigation, this domain remains ACTIVE and poses a significant threat to crypto users. Users are advised to block access to 104.21.77.180 and m.galabetyenigirisadresi.com locally and report it via browser safety tools. The current risk is elevated due to zero detections and absence from blocklists. Remaining risk includes ongoing drainer functionality until site takedown or global blacklisting occurs. [Updates since narrative was generated:] - VirusTotal detections: now 14/91 (narrative was written when count was lower) ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260427-47AECD Favicon MD5: 96a66de67adef28337580739eab71404 TLS cert SHA-256: 1ccb6fdeebc43740f33b0c760051ada5df1a6d476095c25360269cc22fa1bc03 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/m.galabetyenigirisadresi.com/ JSON API: https://api.destroy.tools/v1/check?domain=m.galabetyenigirisadresi.com Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io