# PhishDestroy threat dossier — muzammilaalu.github.io ================================================================ Fetched: 2026-04-30 09:09:46 UTC Canonical: https://phishdestroy.io/domain/muzammilaalu.github.io/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Scam classification: Generic Phishing ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 14/94 security vendors flagged this domain Flagging vendors: ADMINUSLabs, alphaMountain.ai, BitDefender, CyRadar, Emsisoft, G-Data, Google Safebrowsing, Gridinsoft, Lionic, MalwareURL, Netcraft, SafeToOpen, Sophos, Webroot Google Safe Browsing: FLAGGED ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 185.199.111.153 (US, San Francisco) ASN: AS54113 Fastly, Inc. Hosting org: GitHub, Inc Registrar: GitHub, Inc. Nameservers: NS_NOT_FOUND Registered: 2026-04-09 Page title: Site not found · GitHub Pages HTTP response: 404 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-05-07 Status: INVALID chain Fingerprint: 02bdd44d1137ce2317d9aaccd36f753caa1fbec7ee91cc5fae51d81e8ff7dca7 Subject Alternative Names (related infrastructure — often same operator): - github.com - github.io - githubusercontent.com ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-09 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-09 04:03:12 UTC (by PhishDestroy tracker) Last verified: 2026-04-21 16:10:30 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019d6fc2-37e1-7743-aab8-3c1d6177d2eb/ Wayback Machine: https://web.archive.org/web/*/muzammilaalu.github.io crt.sh CT logs: https://crt.sh/?q=%25.muzammilaalu.github.io Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=muzammilaalu.github.io AlienVault OTX: https://otx.alienvault.com/indicator/domain/muzammilaalu.github.io URLhaus: https://urlhaus.abuse.ch/host/muzammilaalu.github.io/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-09 04:05:46 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies muzammilaalu.github.io as an active cryptocurrency drainer posing under GitHub Pages. The domain is engineered to trick users into approving malicious token-transfer permissions that silently drain funds from connected wallets. No known brand impersonation or credential-harvesting front-end has been observed, indicating a focused drainer kit designed to exploit wallet-connect integrations rather than harvest static credentials. Technical indicators confirm high risk: the domain resolves to 185.199.111.153, is registered through GitHub, Inc., and carries a Let’s Encrypt SSL certificate. Google Safe Browsing classifies it as SOCIAL_ENGINEERING, and VirusTotal flags 12 out of 95 security engines. Infrastructure analysis reveals hosting on GitHub’s Pages network with no public creation-date disclosure, yet active malicious behavior is confirmed by multiple threat-intel feeds. Current status is active and escalating; the domain remains unblocked by several DNS providers despite VT consensus. Immediate actions include network-level blocking of 185.199.111.153, disabling GitHub Pages for the associated account, and revoking any wallet-approval transactions linked to this domain. Remaining risk is critical because drainers can execute transfers in seconds once permissions are granted; proactive blocking and user education are required to mitigate further losses. ## EVIDENCE HASHES ---------------------------------------------------------------- TLS cert SHA-256: 02bdd44d1137ce2317d9aaccd36f753caa1fbec7ee91cc5fae51d81e8ff7dca7 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/muzammilaalu.github.io/ JSON API: https://api.destroy.tools/v1/check?domain=muzammilaalu.github.io Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io