Skip to content

xmrwallet.com — Fake Monero Wallet (Server-Side TX Hijacking) #35

@phishdestroy

Description

@phishdestroy

Title: xmrwallet.com — Fake Monero Wallet (Server-Side TX Hijacking)

Type: Scam / Wallet Compromise


Summary:
xmrwallet.com operates as a malicious Monero web wallet. Seed generation is client-side (cnUtil), but all transaction logic is handled server-side, enabling full control over user funds.

https://urlquery.net/report/a56ea134-19f0-467f-88c3-3444f5c49c06
https://www.virustotal.com/gui/domain/www.xmrwallet.com

Technical Details:

  • Seed generated in-browser via cnUtil
  • auth.php collects: address, view key, spend key signature
  • Session: session_key = encrypted_token : base64(address) : base64(viewkey)
  • Frontend TX disabled → raw_tx_and_hash.raw = 0
  • TX sent to /submittransaction.php
  • Payload: {amount, address, payment_id, fee}

Impact:

  • Server builds + broadcasts TX
  • Destination address can be modified
  • Full fund compromise

Infrastructure:

  • IP: 186.2.165.49 (DDoS-Guard, AS59692)
  • NS: ns1/ns2.ddos-guard.net
  • Backend: Apache/2.4.58 (Ubuntu), PHP 8.2.29
  • Registrar: NameSilo (2016 → 2031)
  • SSL: Let's Encrypt (Jan 2026)

IOCs:


Endpoints:

auth.php, getbalance.php, gettransactions.php, submittransaction.php, getoutputs.php, getunspentoutputs.php, getrandomoutputs.php, getsubaddresses.php, settings.php, logout.php


Weaknesses:

  • Exposed composer.json
  • /vendor/ accessible (403)
  • JS error leak: address.startsWith is not a function
  • Session tied to DDoS-Guard cookies
  • Unknown paths → 302 /

Conclusion:
Client-side wallet simulation with server-side transaction control → silent fund redirection. High-confidence scam.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions