# PhishDestroy threat dossier — rugmark.site ================================================================ Fetched: 2026-05-02 06:31:05 UTC Canonical: https://phishdestroy.io/domain/rugmark.site/ ## VERDICT ---------------------------------------------------------------- ACTIVE + CLOAKED — returns HTTP 666 to scanners, real fraudulent site to victims Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) Cloaking: DETECTED — domain returns custom HTTP 666 to scanners while serving fraudulent content to real users (type: content_split) (score: 1/6) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 0/91 security vendors flagged this domain ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 216.198.79.1 (US, Atlanta) ASN: AS16509 Amazon.com, Inc. Hosting org: Lefkoff Industries Registrar: NAMECHEAP INC Nameservers: ns1.vercel-dns.com, ns2.vercel-dns.com Registered: 2026-04-30 Page title: Rugmark HTTP response: 530 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Let's Encrypt / R12 Expires: 2026-06-16 Status: INVALID chain Fingerprint: a790635b7b79df9bfbc5579b506ecd3304270f29828b27cf359cdbea07d0e876 ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-04-30 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-04-30 20:15:28 UTC (by PhishDestroy tracker) Earliest abuse rec: 2026-04-30 17:16:06 UTC — PREDATES current WHOIS registration; retained from a previous registration cycle of the same domain name Last verified: 2026-05-02 07:07:40 UTC Current status: ACTIVE — cloaked behind HTTP 666 to evade scanners Note: one or more events above predate the WHOIS creation date. This typically means the same domain name was previously registered, detected, dropped, and then re-registered by a new party. PhishDestroy preserves the full historical record for operator-attribution research even when the underlying infrastructure changes hands. ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019ddf61-863b-77a2-86ec-322941d5e53e/ URLQuery: https://urlquery.net/report/8a7d0f59-33df-4ff0-9885-c2fa16edceb5 Wayback Machine: https://web.archive.org/web/*/rugmark.site crt.sh CT logs: https://crt.sh/?q=%25.rugmark.site Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=rugmark.site AlienVault OTX: https://otx.alienvault.com/indicator/domain/rugmark.site URLhaus: https://urlhaus.abuse.ch/host/rugmark.site/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-04-30 20:17:11 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies rugmark.site as an active cryptocurrency drainer kit under investigation since January 15, 2026. The domain targets users by masquerading as a legitimate service, luring victims into connecting cryptocurrency wallets to drain assets. No specific brand or drainer kit has been confirmed at this stage, but the threat vector aligns with common cryptocurrency phishing campaigns designed to steal digital assets. This domain resolves to IP address 216.198.79.1 and operates with a Let's Encrypt SSL certificate for HTTPS encryption. VirusTotal currently shows 0/95 detections, indicating low antivirus coverage. The domain was registered through NAMECHEAP INC and went live on January 15, 2026. Google Safe Browsing (GSB) has not yet flagged this domain, and no third-party blocklist entries have been recorded. These technical indicators suggest an emerging threat with minimal detection but high potential for exploitation. The domain remains active with an 'under_investigation' status, and PhishDestroy is monitoring its behavior for further indicators of compromise. Users are strongly advised to avoid interacting with rugmark.site and refrain from connecting any cryptocurrency wallets. Blocking the domain at the network level and updating security tools is recommended to mitigate exposure. The remaining risk is classified as high due to the domain's active status and cryptocurrency drainer potential, despite low current detection rates. ## EVIDENCE HASHES ---------------------------------------------------------------- PhishDestroy Case ID: PD-20260430-A2BF14 Favicon MD5: 83124ddee245015035c25aafd9c8677a TLS cert SHA-256: a790635b7b79df9bfbc5579b506ecd3304270f29828b27cf359cdbea07d0e876 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/rugmark.site/ JSON API: https://api.destroy.tools/v1/check?domain=rugmark.site Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 131,000+ phishing domains. Confirmed takedowns: 91,000+. Site: https://phishdestroy.io