Report Overview

  1. Visited public
    2025-01-17 08:47:26
    Tags
    Submit Tags
  2. URL

    github.com/relativ/monero/raw/main/monero.zip

  3. Finishing URL

    about:privatebrowsing

  4. IP / ASN
    140.82.121.3

    #36459 GITHUB

    Title
    about:privatebrowsing
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
12

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132025-01-15
raw.githubusercontent.com358022014-02-062014-03-012025-01-15

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    raw.githubusercontent.com/relativ/monero/main/monero.zip

  2. IP

    185.199.110.133

  3. ASN

    #54113 FASTLY

  1. File type

    Zip archive data, at least v2.0 to extract, compression method=store

    Size

    3.4 MB (3407540 bytes)

  2. Hash

    cef8ca9e11325fef872bdc6e5fbee9c3

    4e6d2a4efc4091ac1740ff3f78a3b67b691d853e

  1. Archive (10)

  2. FilenameMd5File type
    benchmark_10M.cmd
    14b1ce42ded2df03638180864e4d056f
    DOS batch file, ASCII text
    benchmark_1M.cmd
    4cc3ab4b68dc35959e289f4c7562e909
    DOS batch file, ASCII text
    config.json
    8f608791c930ebe98a2cd39d23fab1d6
    JSON text data
    pool_mine_example.cmd
    e7e82ca383d5c8db7d12f5770d04e2a3
    ASCII text
    rtm_ghostrider_example.cmd
    9b7762432e3ab03dc49b1989ec7b8d1c
    ASCII text
    SHA256SUMS
    4fdd8aac454adc81d8ac6e2b07854b46
    ASCII text
    solo_mine_example.cmd
    9a6e73e55c32bb8db34e599a8ae176a3
    ASCII text
    start.cmd
    6eb783bc229f92d0f8285500928ac8a1
    DOS batch file, ASCII text, with CRLF line terminators
    WinRing0x64.sys
    0c0195c48b6b8582fa6f6373032118da
    PE32+ executable (native) x86-64, for MS Windows, 6 sections
    xmrig.exe
    6f4532e49d65c2be0355b222f96e06e8
    PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 11 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects command line parameters often used by crypto mining software
    Public Nextron YARA rulesmalware
    Detects vulnerable driver mentioned in LOLDrivers project using VersionInfo values from the PE header - WinRing0x64.sys
    YARAhub by abuse.chmalware
    signed_sys_with_vulnerablity
    Public Nextron YARA rulesmalware
    Detects Monero Crypto Coin Miner
    Public Nextron YARA rulesmalware
    Detects Monero mining software
    Elastic Security YARA Rulesmalware
    Linux.Trojan.Pornoasset
    Elastic Security YARA Rulesmalware
    MacOS.Cryptominer.Generic
    Elastic Security YARA Rulesmalware
    MacOS.Cryptominer.Xmrig
    VirusTotalmalicious
    ClamAVmalicious
    Win.Coinminer.Generic-7151250-0

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
GET github.com/relativ/monero/raw/main/monero.zip
140.82.121.4302 Found0 B
GET raw.githubusercontent.com/relativ/monero/main/monero.zip
185.199.110.133200 OK3.4 MB