Overview
We offer several ways to upload files of interest to our cloud infrastructure. Generally used for to report things our agent has missed, allowing us to further optimize our detection algorithms.
Upload Form from our WebApp
Bash Script
Upload Form from our WebApp
You can upload any malware sample using your browser from this URL:
β
βhttps://app.monarx.com/upload
Below a screenshot of the page:
You can simply drag and drop the file within that box or click on the upload icon and you will get a pop-up dialog to select the file to upload. Then simply select the proper file and click submit.
Bash Script - monarx-sample-upload
Bash script used to upload files of interest to our cloud infrastructure. The monarx-sample-upload script is copied into /usr/bin/ when the agent is installed, or alternatively you may download the file below.
Usage
# No arguments example
$ monarx-sample-upload
Upload a sample file to monarx.com for analysis.
Usage:
monarx-sample-upload <path> [--note value]
Options:
-n | --note Optional free form note to include with submission
# Success example (basic)
$ monarx-sample-upload ~/development/shells/RC-SHELL.php
Sample uploaded successfully
# Success example (with custom note)
$ monarx-sample-upload ~/development/shells/RC-SHELL.php --note "Phishing.."
Sample uploaded successfully
# Error example (missing dependency)
$ monarx-sample-upload ~/development/shells/RC-SHELL.php
Error: curl is not installed
# Error example (connection issue)
$ monarx-sample-upload ~/development/shells/RC-SHELL.php
curl: (6) Could not resolve host: api.monarx.com
Error uploading sample
# Error example (remote issue)
$ monarx-sample-upload ~/development/shells/RC-SHELL.php
curl: (22) The requested URL returned error: 500
Error uploading sample
What happens next?
Once the sample is uploaded to our cloud infrastructure, our Threat Research team will review the file and act accordingly.
If you want to follow-up on the status of your submission, please login to your account at https://app.monarx.com and open a new support request using the widget located on the bottom right of the screen.

