Skip to content
Proof of concept tool to detect RandomX cryptojacking malware on Windows
C++ Batchfile
Branch: master
Clone or download
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
src Add a batch file for easier testing Nov 30, 2019
.gitignore Initial commit Nov 29, 2019
LICENSE Initial commit Nov 29, 2019
README.md Update readme Nov 29, 2019
randomx-sniffer.sln Initial commit Nov 29, 2019

README.md

RandomX Sniffer

RandomX Sniffer is a proof of concept tool that can detect RandomX cryptojacking malware on Windows. RandomX Sniffer will detect any process running RandomX regardless of how it's coded or obfuscated. This is possible because the RandomX algorithm leaves a trace in the CPU registers that can be detected.

There are only 2 ways how malware can hide from being detected by this technique:

  1. by emulating floating point operations using integer math and losing >95% of performance in the process
  2. by modifying the operating system

Build

Build using Visual Studio 2019. Precompiled binaries are available on the Releases page.

License

The source code is released into the public domain under CC0.

Donations

Author's XMR address:

845xHUh5GvfHwc2R8DVJCE7BT2sd4YEcmjG8GNSdmeNsP5DTEjXd1CNgxTcjHjiFuthRHAoVEJjM7GyKzQKLJtbd56xbh7V
You can’t perform that action at this time.