General
-
Target
LTOPWIN.msi
-
Size
12.6MB
-
Sample
210722-spazwzw7ga
-
MD5
1b460d350522b0dae0f0091440499577
-
SHA1
07b35239c5ec34579442b88191a3ff4369878db4
-
SHA256
942c8a84f948507690bb3f28791abb671f22e9057e1ded3b77e59771cb0e1d4f
-
SHA512
9979639f32efe7caf6de8a448b886a6c65a8c65eca7ad13ff80c61cf939b15d1964db227188f00e2843baa8d726b1fb16513001c7c68c7aa8bc49af21f4e4cab
Static task
static1
Behavioral task
behavioral1
Sample
LTOPWIN.msi
Resource
win10v20210410
Malware Config
Targets
-
-
Target
LTOPWIN.msi
-
Size
12.6MB
-
MD5
1b460d350522b0dae0f0091440499577
-
SHA1
07b35239c5ec34579442b88191a3ff4369878db4
-
SHA256
942c8a84f948507690bb3f28791abb671f22e9057e1ded3b77e59771cb0e1d4f
-
SHA512
9979639f32efe7caf6de8a448b886a6c65a8c65eca7ad13ff80c61cf939b15d1964db227188f00e2843baa8d726b1fb16513001c7c68c7aa8bc49af21f4e4cab
Score8/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-