-
Notifications
You must be signed in to change notification settings - Fork 25
Open
Description
Title: xmrwallet.com — Fake Monero Wallet (Server-Side TX Hijacking)
Type: Scam / Wallet Compromise
Summary:
xmrwallet.com operates as a malicious Monero web wallet. Seed generation is client-side (cnUtil), but all transaction logic is handled server-side, enabling full control over user funds.
https://urlquery.net/report/a56ea134-19f0-467f-88c3-3444f5c49c06
https://www.virustotal.com/gui/domain/www.xmrwallet.com
Technical Details:
- Seed generated in-browser via cnUtil
- auth.php collects: address, view key, spend key signature
- Session: session_key = encrypted_token : base64(address) : base64(viewkey)
- Frontend TX disabled → raw_tx_and_hash.raw = 0
- TX sent to /submittransaction.php
- Payload: {amount, address, payment_id, fee}
Impact:
- Server builds + broadcasts TX
- Destination address can be modified
- Full fund compromise
Infrastructure:
- IP: 186.2.165.49 (DDoS-Guard, AS59692)
- NS: ns1/ns2.ddos-guard.net
- Backend: Apache/2.4.58 (Ubuntu), PHP 8.2.29
- Registrar: NameSilo (2016 → 2031)
- SSL: Let's Encrypt (Jan 2026)
IOCs:
- Domains: xmrwallet.com, www.xmrwallet.com
- IP: 186.2.165.49
- GA: UA-116766241-1
- Google Verify: d-En_D3kMw6CqZpPwZeDn4ICI5Tyk1WvPYdVdGzEWr8
- WOT: 8a5554c915e3c17278a7
- GitHub: https://github.com/XMRWallet
- Twitter: https://twitter.com/xmrwalletcom
Endpoints:
auth.php, getbalance.php, gettransactions.php, submittransaction.php, getoutputs.php, getunspentoutputs.php, getrandomoutputs.php, getsubaddresses.php, settings.php, logout.php
Weaknesses:
- Exposed composer.json
- /vendor/ accessible (403)
- JS error leak: address.startsWith is not a function
- Session tied to DDoS-Guard cookies
- Unknown paths → 302 /
Conclusion:
Client-side wallet simulation with server-side transaction control → silent fund redirection. High-confidence scam.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels