Sunday, April 27, 2025
Homecyber securityGhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems

GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems

Published on

SIEM as a Service

Follow Us on Google News

GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within the cybercrime ecosystem.

First identified in October 2023 on Russian-language forums, its distribution expanded to English-speaking criminal platforms by mid-2024.

This malware operates as part of a Malware-as-a-Service (MaaS) model, allowing threat actors to exploit compromised systems for financial gain.

- Advertisement - Google News
GhostSocks MaaS Login Panel

Its integration with the LummaC2 information stealer further amplifies its potential, enabling advanced credential abuse and bypassing anti-fraud mechanisms.

The partnership between GhostSocks and LummaC2 was formalized in February 2024, offering features like automatic provisioning through Lumma’s administration panel.

Additionally, discounts for Lumma users have incentivized adoption.

GhostSocks employs anti-sandboxing techniques and obfuscation methods, including the use of tools like Garble and Gofuscator, to evade detection.

These features make it a preferred choice for attackers targeting high-value sectors such as financial institutions.

Technical Mechanisms of GhostSocks

At its core, GhostSocks leverages a SOCKS5 backconnect proxy to reroute network traffic through compromised systems.

{
“buildVersion”: “0pTk.PWh2DyJ”, // <- likely an internal reference to the current build version
“md5”: “bb857552657a9c31e68797e9bd30ac2”, // <- the MD5 hash of the malware on-disk, gathered from GetModuleHandle
“proxyUsername”: “uDoSfUGf”, // <- the SOCKS5 back-connect username to be used
“proxyPassword”: “uDoSfUGf”, // <- The SOCKS5 back-connect password to be used
“userId”: “gpn4wrgAehjlgkUKkN33e4iDkc1OfRHA”, // <- likely to identify the affiliate
}

This approach masks the attacker’s origin and bypasses geographic restrictions and IP-based security measures.

Upon initialization, the malware creates an embedded configuration structure containing hardcoded data and dynamically calculated values.

This configuration is obfuscated and stored locally before establishing communication with its command-and-control (C2) infrastructure.

The malware initiates a relay-based C2 communication process using HTTP APIs.

It queries intermediary servers (Tier 2 relays) to obtain Tier 1 relay IPs and ports, which are used to establish TCP connections for SOCKS5 tunneling.

This allows attackers to exploit the victim’s IP address for fraudulent activities, such as bypassing financial institution security checks.

Infrawatch researchers identified multiple C2s and backconnect hosts associated with GhostSocks across various networks.

Most of these servers operate on ports like 3001 and are hosted on Russian-speaking Virtual Dedicated Server (VDS) providers such as VDSina.

The malware’s reliance on consistent C2 behavioral patterns, such as specific API key error responses, offers defenders an opportunity to track its activity.

Beyond Proxying: Additional Backdoor Capabilities

GhostSocks extends its functionality beyond SOCKS5 proxying by incorporating backdoor capabilities.

These include arbitrary command execution, modification of SOCKS5 credentials, and downloading and executing malicious files.

These features enable attackers to maintain persistent access and further exploit infected systems.

GhostSocks exemplifies the growing commodification of backconnect proxy malware within the cybercrime landscape.

Its seamless integration with LummaC2 and availability via MaaS platforms highlight the increasing sophistication of adversarial tools.

By leveraging behavioral indicators such as unique C2 responses, cybersecurity teams can enhance their defenses against this evolving threat.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...