: In more recent activity, a related variant named ViperSoftX has been found disguised as cracked software to steal cryptocurrency and system information.

According to analysis from Joe Sandbox and Hybrid Analysis , typical indicators include: : E4272FB1E61D3D995EEA488931E815AF . File Paths : Often found in %TEMP% or on the %DESKTOP% .

: The malware frequently uses CryptOne packing to hide its code and implements stalling techniques (like calling Sleep functions) to wait out sandbox analysis.

: It has been documented as a downloader for Locky ransomware and has appeared in campaigns involving the RagnarLocker threat group.

Based on threat intelligence reports, is a generic name frequently used by various malware families and threat actors, most notably associated with ransomware deployment and information theft. Malware Identity and Context

: It modifies registry keys in HKCU\Software\Microsoft\Windows\CurrentVersion\Run and Winlogon to ensure it restarts every time the computer boots. Forensic Indicators (IOCs)

Want to stay informed?
Sign up for the TIM newsletter!

No, thanks

Total
0
Share
TIM News | from Treasure Island Media
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.