Send a message.
We’re here to answer any question you may have.
careers
Would you like to join our growing team?
careers@hub.com
Feedbacks
Have a project in mind? Send a message.
info@hub.com
Error: Contact form not found.
: It has been documented as a downloader for Locky ransomware and has appeared in campaigns involving the RagnarLocker threat group.
According to analysis from Joe Sandbox and Hybrid Analysis , typical indicators include: : E4272FB1E61D3D995EEA488931E815AF . File Paths : Often found in %TEMP% or on the %DESKTOP% . Soft.exe
Nuclear Exploit Kit (EK), cracked software, or malicious torrents File encryption (Ransomware) or theft of crypto-wallet data Detection High malicious score (100/100) in automated analysis Threat Roundup for August 12 to August 19 : It has been documented as a downloader
: It may drop secondary executables with randomized names or names like svchost015.exe . Summary Table: Behavioral Analysis Observed Activity Type Ransomware Downloader / InfoStealer Delivery Nuclear Exploit Kit (EK), cracked software, or malicious
: It is known to inject malicious code into legitimate Windows processes like svchost.exe to operate stealthily in memory.
: The malware frequently uses CryptOne packing to hide its code and implements stalling techniques (like calling Sleep functions) to wait out sandbox analysis.
: In more recent activity, a related variant named ViperSoftX has been found disguised as cracked software to steal cryptocurrency and system information.