Analysis

  • max time kernel
    29s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2023 02:59

General

  • Target

    2023-04-15_95933b62985a21d82a3d3b2ee87a4ff5_destroyer_kangaroo.exe

  • Size

    17KB

  • MD5

    95933b62985a21d82a3d3b2ee87a4ff5

  • SHA1

    57f0db016e44263ac6c7084fc2b871ff00a5c727

  • SHA256

    375cd2456b4a9e7339438fa18d6acedb6b19cee38fa66f32d11df1741587852c

  • SHA512

    2724e03149c0287499d1bb23d1e52e3161bb22b78ad858bd655ab56e6c030512a7bfe8cdc2e592a039fd784de000f43a62816b8681fee9b3a673a196cb80eceb

  • SSDEEP

    384:19uTZHnVcaI2r4BCTXZhtam11fTgC01p1Xx99zpWwhWQWMvX:19u9CaxEovcm/BCvXd/X

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-04-15_95933b62985a21d82a3d3b2ee87a4ff5_destroyer_kangaroo.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-04-15_95933b62985a21d82a3d3b2ee87a4ff5_destroyer_kangaroo.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows NT\explorer.exe

    Filesize

    17KB

    MD5

    95933b62985a21d82a3d3b2ee87a4ff5

    SHA1

    57f0db016e44263ac6c7084fc2b871ff00a5c727

    SHA256

    375cd2456b4a9e7339438fa18d6acedb6b19cee38fa66f32d11df1741587852c

    SHA512

    2724e03149c0287499d1bb23d1e52e3161bb22b78ad858bd655ab56e6c030512a7bfe8cdc2e592a039fd784de000f43a62816b8681fee9b3a673a196cb80eceb