Report Overview

  1. Submitted URL

    github.com/andru-kun/wildrig-multi/releases/download/0.39.0/wildrig-multi-windows-0.39.0.7z

  2. IP

    140.82.121.4

    ASN

    #36459 GITHUB

  3. Submitted

    2024-04-20 10:02:28

    Access

    public

  4. Website Title

    about:privatebrowsing

  5. Final URL

    about:privatebrowsing

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    18

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
github.com14232007-10-092016-07-132024-03-24
objects.githubusercontent.com1340602014-02-062021-11-012024-04-20

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules

No alerts detected


OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


Files detected

  1. URL

    objects.githubusercontent.com/github-production-release-asset-2e65be/148840868/567c4620-d793-4a30-880d-c63a0b890978?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAVCODYLSA53PQK4ZA%2F20240420%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240420T100157Z&X-Amz-Expires=300&X-Amz-Signature=e7d3073e37989051d4a189e1554a53c76d8db998435b41d2438e8cf33865f93c&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=148840868&response-content-disposition=attachment%3B%20filename%3Dwildrig-multi-windows-0.39.0.7z&response-content-type=application%2Foctet-stream

  2. IP

    185.199.111.133

  3. ASN

    #54113 FASTLY

  1. File type

    7-zip archive data, version 0.4

    Size

    17 MB (16584893 bytes)

  2. Hash

    debc0dd455fd32c1a7aa339c1dfc5758

    690eced289590439c95d311b65d17e1f7381caa4

  1. Archive (27)

  2. FilenameMd5File type
    help.txt
    07b9388262ca54f79be4e833de335832
    ASCII text, with CRLF line terminators
    print-devices.bat
    a68da1f621c4d0a4278e32d751900391
    DOS batch file, ASCII text, with CRLF line terminators
    print-help.bat
    f005e3a071eac5b1ac786baf4e15d707
    DOS batch file, ASCII text, with CRLF line terminators
    readme.txt
    17cc6ed51fb7f345cf021a6974fe6d33
    ASCII text, with CRLF line terminators
    start-Bamboo.bat
    eff5b51ca40a0f5af27b88060c532727
    DOS batch file, ASCII text, with CRLF line terminators
    start-BitCore-zergpool.com.bat
    e7186dcc62b45a62f7e8c54a68a7c9d9
    DOS batch file, ASCII text, with CRLF line terminators
    start-BitCore-zpool.ca.bat
    ec54973d558c140892047145d42e563f
    DOS batch file, ASCII text, with CRLF line terminators
    start-c0ban.bat
    32a2bb9267d9c6ead6c34b056410cd2d
    DOS batch file, ASCII text, with CRLF line terminators
    start-Clore.bat
    defd0ce6ba6a0eaae529b122c91609ab
    DOS batch file, ASCII text, with CRLF line terminators
    start-Evrmore.bat
    01949ab4e28a3b6ed4e632f0c62c837d
    DOS batch file, ASCII text, with CRLF line terminators
    start-GoodMorningNetwork.bat
    d40f25df8a3c0d7e51826e6977d0d1cd
    DOS batch file, ASCII text, with CRLF line terminators
    start-Neoxa.bat
    43b4588aa4391bc370bda82e98d51b1c
    DOS batch file, ASCII text, with CRLF line terminators
    start-Nexa.bat
    1ac673d6a7a58e920c5282e789758473
    DOS batch file, ASCII text, with CRLF line terminators
    start-OpticalBitcoin.bat
    37a7323a6d4d3f644e6d00ab22844836
    DOS batch file, ASCII text, with CRLF line terminators
    start-OpticalBitcoin_lockMemory.bat
    6f15ea5c66fd7f1acdf8ebdb070619a5
    ASCII text, with CRLF line terminators
    start-Pulsar.bat
    f99bf7e34c36a92e942164d580cddc2e
    DOS batch file, ASCII text, with CRLF line terminators
    start-Radiant.bat
    e113e744c6bc4bfa5252395feb5141f4
    DOS batch file, ASCII text, with CRLF line terminators
    start-Radiant_lockMemory.bat
    03568011134f4324b0f350fcc3c1dd58
    ASCII text, with CRLF line terminators
    start-Raptoreum.bat
    c37e7467e3fea0f5587c0c56e321e242
    DOS batch file, ASCII text, with CRLF line terminators
    start-Ravencoin.bat
    1d48528fbc8f438444779917944982f8
    DOS batch file, ASCII text, with CRLF line terminators
    start-Sero.bat
    07f30efa84908dcbb6ac37b74cca8e03
    DOS batch file, ASCII text, with CRLF line terminators
    start-SkyDoge.bat
    892bb1cc51178c937f7dcbe5b5ed9b15
    DOS batch file, ASCII text, with CRLF line terminators
    start-VeriBlock.bat
    311d4cfd450e4e374842debe98c22044
    DOS batch file, ASCII text, with CRLF line terminators
    start-Zano.bat
    1794c0d309e0f80f748901657aa45d3c
    DOS batch file, ASCII text, with CRLF line terminators
    start.bat
    85c5945beda65099f6aedb5738784424
    DOS batch file, ASCII text, with CRLF line terminators
    start_apply_OC.bat
    ba2339ff3b1d206b91f0cf717020387f
    ASCII text, with CRLF line terminators
    wildrig.exe
    11afe5b07554a4835a90a56fbe6f598f
    PE32+ executable (console) x86-64, for MS Windows, 3 sections

    Detections

    AnalyzerVerdictAlert
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    Public Nextron YARA rulesmalware
    Detects mining pool protocol string in Executable
    VirusTotalsuspicious

JavaScript (0)

HTTP Transactions (2)

URLIPResponseSize
github.com/andru-kun/wildrig-multi/releases/download/0.39.0/wildrig-multi-windows-0.39.0.7z
140.82.121.3302 Found0 B
objects.githubusercontent.com/github-production-release-asset-2e65be/148840868/567c4620-d793-4a30-880d-c63a0b890978?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAVCODYLSA53PQK4ZA%2F20240420%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240420T100157Z&X-Amz-Expires=300&X-Amz-Signature=e7d3073e37989051d4a189e1554a53c76d8db998435b41d2438e8cf33865f93c&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=148840868&response-content-disposition=attachment%3B%20filename%3Dwildrig-multi-windows-0.39.0.7z&response-content-type=application%2Foctet-stream
185.199.111.133200 OK17 MB