Soft.exe Direct

: In more recent activity, a related variant named ViperSoftX has been found disguised as cracked software to steal cryptocurrency and system information.

: It modifies registry keys in HKCU\Software\Microsoft\Windows\CurrentVersion\Run and Winlogon to ensure it restarts every time the computer boots. Forensic Indicators (IOCs)

: It is known to inject malicious code into legitimate Windows processes like svchost.exe to operate stealthily in memory. Soft.exe

According to analysis from Joe Sandbox and Hybrid Analysis , typical indicators include: : E4272FB1E61D3D995EEA488931E815AF . File Paths : Often found in %TEMP% or on the %DESKTOP% .

Nuclear Exploit Kit (EK), cracked software, or malicious torrents File encryption (Ransomware) or theft of crypto-wallet data Detection High malicious score (100/100) in automated analysis Threat Roundup for August 12 to August 19 : In more recent activity, a related variant

: It often serves as a Trojan Downloader —a malicious program designed to bypass security, establish a foothold, and then pull more damaging payloads onto the system. Technical Characteristics

: It has been documented as a downloader for Locky ransomware and has appeared in campaigns involving the RagnarLocker threat group. According to analysis from Joe Sandbox and Hybrid

: It may drop secondary executables with randomized names or names like svchost015.exe . Summary Table: Behavioral Analysis Observed Activity Type Ransomware Downloader / InfoStealer Delivery

Close

Opp! Adblock is detected!

Xin hãy tắt Extension chặn quảng cáo (Adblock, Adguard, Ghostly...) để xem đầy đủ hình ảnh! Cảm ơn bạn đã ủng hộ! Xin lỗi vì sự bất tiện này!Please disable Adblock extension to view post images! Thanks for your support!