Current version

v1.10.4 (stable)

Navigation

Main page
Archived news
Downloads
Documentation
   Capture
   Compiling
   Processing
   Crashes
Features
Filters
Plugin SDK
Knowledge base
Contact info
 
Other projects
   Altirra

Archives

Blog Archive

Soft.exe May 2026

: In more recent activity, a related variant named ViperSoftX has been found disguised as cracked software to steal cryptocurrency and system information.

: It has been documented as a downloader for Locky ransomware and has appeared in campaigns involving the RagnarLocker threat group. Soft.exe

: It may drop secondary executables with randomized names or names like svchost015.exe . Summary Table: Behavioral Analysis Observed Activity Type Ransomware Downloader / InfoStealer Delivery : In more recent activity, a related variant

Nuclear Exploit Kit (EK), cracked software, or malicious torrents File encryption (Ransomware) or theft of crypto-wallet data Detection High malicious score (100/100) in automated analysis Threat Roundup for August 12 to August 19 Malware Identity and Context

: It often serves as a Trojan Downloader —a malicious program designed to bypass security, establish a foothold, and then pull more damaging payloads onto the system. Technical Characteristics

: It modifies registry keys in HKCU\Software\Microsoft\Windows\CurrentVersion\Run and Winlogon to ensure it restarts every time the computer boots. Forensic Indicators (IOCs)

Based on threat intelligence reports, is a generic name frequently used by various malware families and threat actors, most notably associated with ransomware deployment and information theft. Malware Identity and Context