Soft.exe Link
: In more recent activity, a related variant named ViperSoftX has been found disguised as cracked software to steal cryptocurrency and system information.
Based on threat intelligence reports, is a generic name frequently used by various malware families and threat actors, most notably associated with ransomware deployment and information theft. Malware Identity and Context Soft.exe
According to analysis from Joe Sandbox and Hybrid Analysis , typical indicators include: : E4272FB1E61D3D995EEA488931E815AF . File Paths : Often found in %TEMP% or on the %DESKTOP% . : In more recent activity, a related variant
: It may drop secondary executables with randomized names or names like svchost015.exe . Summary Table: Behavioral Analysis Observed Activity Type Ransomware Downloader / InfoStealer Delivery File Paths : Often found in %TEMP% or on the %DESKTOP%
: It modifies registry keys in HKCU\Software\Microsoft\Windows\CurrentVersion\Run and Winlogon to ensure it restarts every time the computer boots. Forensic Indicators (IOCs)
: It has been documented as a downloader for Locky ransomware and has appeared in campaigns involving the RagnarLocker threat group.