"Go 1.1 package http" is the default UA for the Google Go programming language. If the developer does not rename after building their bot, this will be the UA.
However, a quick web search will show a lot of webmasters complaining their sites were scraped at a high rate by this UA, from various IP ranges. So it appears to be easily used for malicious purposes.
Even though I had the UA blocked (because of a similar named agent) and returned all 403s, this thing continued to hit the same web page of mine 6k times within an hour, then came back again and again. On that day it came from 2 different hosts in Sweden, then a host in the UK. I've been dealing with it for several days now and lately it comes from a well known Germany server farm, hitting several hundred times, then coming back in a few hours and doing it again and again.
I've sent close to a dozen email complaints to the abuse desk at all these hosts, with varied responses, but it just comes back from a different host... so either the guy buys cheap server space all over Europe, or these are all infected machines running this script.
Although I block the agent, the huge amount of 403s fill my logs with bloat. I've written a little piece of code to remove the hits from the downloaded access log, but that's another step I wish I didn't have to do.