# PhishDestroy threat dossier — matreamaskeieaje.azurewebsites.net ================================================================ Fetched: 2026-04-22 03:21:41 UTC Canonical: https://phishdestroy.io/domain/matreamaskeieaje.azurewebsites.net/ ## VERDICT ---------------------------------------------------------------- HIGH THREAT — malicious activity confirmed Composite threat score: 77/100 (PhishDestroy scoring — see methodology below) Scam classification: Impersonation Targeted brand: MetaMask ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/94 security vendors flagged this domain URLQuery: 1 detections ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 20.48.204.1 (CA, Toronto) ASN: AS8075 Microsoft Corporation Hosting org: Microsoft Azure App Service (canadacentral) Registrar: REGISTRAR_NOT_FOUND Nameservers: NS_NOT_FOUND Registered: 2026-04-15 Page title: The Ultimate Crypto Wallet for DeFi, Web3 Apps, and NFTs | MetaMask HTTP response: 403 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Microsoft Corporation / Microsoft Azure RSA TLS Issuing CA 08 Expires: 2026-08-25 Status: INVALID chain Fingerprint: e1dad62a809e7075b417e06773c03ba38476f7411ca3365e9f09fdb90d5f67b9 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-15 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-15 01:48:32 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-04-14 22:49:27 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-04-22 05:20:00 UTC Current status: ACTIVE / observable Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d8e2d-3699-74af-b53e-40dccacf60d7/ URLQuery: https://urlquery.net/report/500e8129-2fef-4ec9-bbcb-fb479ce412bb Wayback Machine: https://web.archive.org/web/*/matreamaskeieaje.azurewebsites.net crt.sh CT logs: https://crt.sh/?q=%25.matreamaskeieaje.azurewebsites.net Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=matreamaskeieaje.azurewebsites.net AlienVault OTX: https://otx.alienvault.com/indicator/domain/matreamaskeieaje.azurewebsites.net URLhaus: https://urlhaus.abuse.ch/host/matreamaskeieaje.azurewebsites.net/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-15 01:49:11 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies matreamaskeieaje.azurewebsites.net as a malicious crypto drainer site hosted on Microsoft Azure infrastructure. This domain resolves to IP 20.48.204.1 and is designed to trick users into downloading counterfeit asset files that, when executed, drain cryptocurrency wallet credentials from victims’ devices. The threat actor leverages Azure’s trusted brand reputation to bypass network defenses and deceive security tools, posing a severe risk to users interacting with cryptocurrency platforms or digital assets. This domain was flagged with a suspicious SSL certificate issued by Microsoft Corporation, which enhances its credibility while masking malicious intent. According to VirusTotal analysis as of seed 73e167, the domain currently shows 0 detections out of 95 security engines—indicating it remains undetected by mainstream antivirus systems. The domain is hosted on a Microsoft Azure endpoint, and its infrastructure is currently active, enabling real-time attacks. Security researchers continue to investigate the scope of credential theft campaigns associated with this domain. Users who have accessed or downloaded files from matreamaskeieaje.azurewebsites.net should immediately disconnect from the internet, close all browser sessions, and run a full antivirus scan using updated threat definitions. Do not enter cryptocurrency wallet credentials or private keys on any site linked from this domain. If your wallet has been compromised, transfer remaining funds to a secure wallet and revoke any unauthorized access. Report the incident to your wallet provider and local cybersecurity authorities. Avoid clicking on any prompts or downloads from this site, even if they appear legitimate—they are designed to exfiltrate sensitive data and drain digital assets. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260414-15B73E Favicon MD5: fafaaae1a9f39c6d85756bb6f281a6a1 TLS cert SHA-256: e1dad62a809e7075b417e06773c03ba38476f7411ca3365e9f09fdb90d5f67b9 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/matreamaskeieaje.azurewebsites.net/ JSON API: https://api.destroy.tools/v1/check?domain=matreamaskeieaje.azurewebsites.net Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io