Report Overview

  1. Submitted URL

    148.163.121.37/xmrig.exe

  2. IP

    148.163.121.37

    ASN

    #53755 IOFLOOD

  3. Submitted

    2024-04-23 05:32:11

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    11

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
148.163.121.37unknownunknownNo dataNo data

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
medium148.163.121.37/xmrig.exeDetects Monero Crypto Coin Miner
medium148.163.121.37/xmrig.exeDetects Monero mining software
medium148.163.121.37/xmrig.exeLinux.Trojan.Pornoasset
medium148.163.121.37/xmrig.exeMacOS.Cryptominer.Generic
medium148.163.121.37/xmrig.exeMacOS.Cryptominer.Xmrig

Files detected

  1. URL

    148.163.121.37/xmrig.exe

  2. IP

    148.163.121.37

  3. ASN

    #53755 IOFLOOD

  1. File type

    PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 11 sections

    Size

    8.3 MB (8253952 bytes)

  2. Hash

    7fe01842d8fec7b62705d27636354c7f

    6a471bb66cbf9c6e61be7bb75af5ff7d33f1d620

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects Monero Crypto Coin Miner
    Public Nextron YARA rulesmalware
    Detects Monero mining software
    Elastic Security YARA Rulesmalware
    Linux.Trojan.Pornoasset
    Elastic Security YARA Rulesmalware
    MacOS.Cryptominer.Generic
    Elastic Security YARA Rulesmalware
    MacOS.Cryptominer.Xmrig
    VirusTotalmalicious

JavaScript (0)

HTTP Transactions (1)

URLIPResponseSize
148.163.121.37/xmrig.exe
148.163.121.37200 OK8.3 MB