# PhishDestroy threat dossier — yud1xpin.brandc.my.id ================================================================ Fetched: 2026-05-21 17:07:16 UTC Canonical: https://phishdestroy.io/domain/yud1xpin.brandc.my.id/ ## VERDICT ---------------------------------------------------------------- CRITICAL THREAT — DO NOT VISIT Composite threat score: 100/100 (PhishDestroy scoring — see methodology below) ## DETECTION EVIDENCE ---------------------------------------------------------------- VirusTotal: 21/95 security vendors flagged this domain Flagging vendors: ADMINUSLabs, Criminal IP, BitDefender, Chong Lua Dao, Cluster25, CRDF, CyRadar, ESET, Emsisoft, Forcepoint ThreatSeeker, Fortinet, G-Data, Gridinsoft, Kaspersky, LevelBlue, Lionic, Netcraft, SOCRadar, Sophos, VIPRE ## INFRASTRUCTURE ---------------------------------------------------------------- IP address: 172.67.201.243 (CA, Toronto) ASN: AS13335 Cloudflare, Inc. Hosting org: Cloudflare, Inc. Registrar: REGISTRAR_NOT_FOUND Nameservers: NS_NOT_FOUND Registered: 2026-05-21 Page title: 𝗗𝗔𝗡𝗔 | 𝗖𝘂𝘀𝘁𝗼𝗺𝗲𝗿 𝗖𝗮𝗿𝗲 𝗗𝗔𝗡𝗔 HTTP response: 200 ## TLS CERTIFICATE ---------------------------------------------------------------- Issuer: Google Trust Services / WE1 Expires: 2026-07-13 Status: INVALID chain Fingerprint: 6b25fef90329524da9eb422033c0976fa4216690222c4e98dbb0b4c706a9cb28 Subject Alternative Names (related infrastructure — often same operator): - brandc.my.id ## ABUSE-REPORT HISTORY (evidence of registrar non-response) ---------------------------------------------------------------- Status: pending notification queue. No abuse reports filed yet — this domain is waiting for the next cycle of our automated abuse-reporter. ## TIMELINE ---------------------------------------------------------------- Domain registered: 2026-05-21 (per WHOIS / CT — may reflect a renewal or transfer date, not first-ever registration) First detected: 2026-05-21 15:25:30 UTC (by PhishDestroy tracker) Last verified: 2026-05-21 19:50:04 UTC Current status: ACTIVE / observable ## EXTERNAL CORROBORATION (third-party evidence) ---------------------------------------------------------------- URLScan.io: https://urlscan.io/result/019e4a7e-4019-779b-ba91-8fd777dc627d/ Wayback Machine: https://web.archive.org/web/*/yud1xpin.brandc.my.id crt.sh CT logs: https://crt.sh/?q=%25.yud1xpin.brandc.my.id Google transparency: https://transparencyreport.google.com/safe-browsing/search?url=yud1xpin.brandc.my.id AlienVault OTX: https://otx.alienvault.com/indicator/domain/yud1xpin.brandc.my.id URLhaus: https://urlhaus.abuse.ch/host/yud1xpin.brandc.my.id/ ## ANALYST NARRATIVE ---------------------------------------------------------------- [Generated: 2026-05-21 15:26:39 UTC — narrative may predate facts above. Treat fields in TIMELINE / DETECTION EVIDENCE / INFRASTRUCTURE as authoritative if they differ from the prose below.] PhishDestroy identifies yud1xpin.brandc.my.id as an active crypto-draining site masquerading behind a legitimate-looking brand subdomain. This domain lures victims with fake offers or urgent messages, prompting wallet connections that silently transfer funds to attacker-controlled addresses. Once a wallet is linked, the drainer siphons tokens without additional confirmation, leaving users with empty balances and no recourse. Always verify URLs before interacting and never connect wallets to unfamiliar sites. This domain was flagged by 21 of 95 VirusTotal security vendors and resolves to IP 172.67.201.243 with a Google Trust Services SSL certificate. The my.id registrar and recent creation indicate opportunistic abuse of free subdomain services to bypass traditional blocklists. Historical records show the domain appeared only days ago, highlighting the speed at which these scams proliferate. If you visited yud1xpin.brandc.my.id, disconnect your wallet immediately, revoke any permissions granted, and transfer remaining assets to a clean wallet. Scan devices for malware, rotate passwords, and report the incident to your security team. Monitor blockchain transactions for unauthorized transfers and consider freezing affected accounts if supported. ## EVIDENCE HASHES ---------------------------------------------------------------- Favicon MD5: 45525a4e10b53535c2f0a134aec2d0fe TLS cert SHA-256: 6b25fef90329524da9eb422033c0976fa4216690222c4e98dbb0b4c706a9cb28 ## SCORING METHODOLOGY ---------------------------------------------------------------- Composite score is NOT derived from VirusTotal alone. PhishDestroy aggregates: - VirusTotal positive ratio - Public blocklist consensus (MetaMask, ScamSniffer, OpenPhish, PhishTank, URLhaus, CryptoFirewall, SEAL, Polkadot, Enkrypt, Phishunt, DiscordPhishing, PhishingDB) - Cloaking detection (HTTP 666 or rendering delta between bot and real visitor) - DNS-filter consensus (Quad9, CleanBrowsing, NextDNS, AdGuard, Cloudflare, etc.) - AlienVault OTX pulses + Cloudflare Radar + Google Safe Browsing - URLScan / URLQuery verdicts - Brand-impersonation heuristics (DOM analysis of forms, logos, wording) - Known phishing-kit fingerprinting (favicon hash, JS obfuscation signatures) - Wallet-drainer family classification (Angel, MS, Rainbow, Pink, Inferno, ...) - Free-TLS vs paid-cert ratio (throwaway infrastructure signal) - Registrar/hosting abuse history (this registrar's track record) - Human researcher sign-off (volunteer takedown team) A domain present in our database is ALREADY flagged. A low VT count by itself does NOT mean the domain is safe — new scam domains routinely show 0/95 VT for their first 7–30 days while actively draining wallets. Always cross-reference the composite score and the individual indicators above, not just VT. ## CORRECTIONS / APPEALS ---------------------------------------------------------------- Full HTML report: https://phishdestroy.io/domain/yud1xpin.brandc.my.id/ JSON API: https://api.destroy.tools/v1/check?domain=yud1xpin.brandc.my.id Appeal a flag: https://phishdestroy.io/appeals/ (responded to within 48 hours, FP rate <0.01%) Submit a report: https://t.me/PhishDestroy_bot About PhishDestroy: volunteer-driven open-source threat-intelligence platform. Tracked: 152,573 domains (43,180 alive under monitoring, 109,011 confirmed takedowns/dead). Site: https://phishdestroy.io