GhostSocks: From Initial Access to Residential Proxy
GhostSocks is a Malware-as-a-Service (MAAS) that converts compromised devices into residential proxies, enabling threat actors to bypass anti-fraud mechanisms. Introduced in October 2023, it gained popularity after partnering with LummaStealer in February 2024. The malware, coded in Golang, uses obfuscation techniques and can be built as a 32-bit DLL or executable. It doesn't implement persistence mechanisms but focuses on SOCKS5 functionality. GhostSocks uses a configuration file or hardcoded config to connect to C2 servers, randomly generates credentials, and establishes a SOCKS5 connection using open-source libraries. Despite law enforcement actions against related platforms, GhostSocks continues to operate, posing ongoing risks of double victimization and long-term network access for cybercriminals.
AI Analysis
Technical Summary
GhostSocks is a Malware-as-a-Service (MaaS) platform first identified in October 2023 that transforms compromised devices into residential proxies. Written in Golang, GhostSocks is designed to facilitate threat actors in bypassing anti-fraud and security mechanisms by routing malicious traffic through infected endpoints, effectively masking their origin. The malware can be deployed as either a 32-bit DLL or executable and employs obfuscation techniques to evade detection. Unlike many malware strains, GhostSocks does not implement persistence mechanisms, indicating its focus is on transient proxy functionality rather than long-term system control. It establishes SOCKS5 proxy connections using open-source libraries, with credentials randomly generated per session. Configuration is managed via either a configuration file or hardcoded parameters that direct the malware to command and control (C2) servers. GhostSocks gained traction after partnering with LummaStealer in February 2024, a credential-stealing malware, which likely aids in initial access or credential harvesting. Despite law enforcement efforts against related platforms, GhostSocks remains active, posing risks of double victimization where infected devices are used both as victims and as tools for further attacks. The malware’s ability to convert devices into residential proxies enables cybercriminals to maintain long-term network access and complicates attribution and blocking efforts by leveraging legitimate residential IP addresses. Indicators of compromise include multiple IP addresses and file hashes linked to the malware, as well as domains and URLs used for C2 communication and registration. The malware’s tactics align with several MITRE ATT&CK techniques such as obfuscation (T1027), command and control over SOCKS proxies (T1090), and credential dumping or stealing (T1219).
Potential Impact
For European organizations, GhostSocks presents a multifaceted threat. Infected devices within corporate or home networks can be covertly repurposed as proxies, enabling attackers to route malicious traffic through legitimate European IP addresses, thereby bypassing geo-restrictions and anti-fraud systems commonly used in financial services, e-commerce, and governmental sectors. This can facilitate fraud, data exfiltration, and further lateral movement within networks. The lack of persistence means infections may be transient but can recur if initial access vectors remain unmitigated. The partnership with LummaStealer suggests that credential theft is a component of the attack chain, increasing risks of account compromise and unauthorized access to sensitive systems. Additionally, the use of residential proxies complicates incident response and attribution, potentially delaying detection and remediation. The risk of double victimization means that organizations may suffer both direct compromise and indirect harm through their devices being used in broader criminal infrastructures. This can damage reputation, incur regulatory penalties under GDPR for inadequate security, and lead to financial losses from fraud or operational disruption.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Monitor network traffic for unusual SOCKS5 proxy activity, especially outbound connections to known C2 IPs and domains associated with GhostSocks. 2) Employ endpoint detection and response (EDR) solutions capable of detecting Golang-based malware and obfuscation patterns. 3) Harden initial access vectors by enforcing multi-factor authentication, especially to prevent credential theft facilitated by LummaStealer. 4) Regularly audit and restrict proxy and tunneling protocols within corporate networks to prevent unauthorized proxy usage. 5) Conduct threat hunting exercises focusing on the identified IoCs such as specific IP addresses, hashes, and domain names. 6) Educate users about phishing and credential theft risks to reduce infection likelihood. 7) Implement network segmentation to limit lateral movement and isolate infected devices quickly. 8) Collaborate with ISPs and law enforcement to report and mitigate proxy abuse originating from residential IPs. 9) Maintain updated threat intelligence feeds to detect emerging variants or related malware campaigns. 10) Since GhostSocks does not persist, rapid detection and remediation of infected hosts can effectively reduce impact.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
Indicators of Compromise
- ip: 86.54.24.25
- hash: 41dc5b08632cd0247b0ada4ed36f2b68
- hash: d0eb82fd3774f614ee28f148f3681ca48677f0ff
- hash: b4709cfb8f9cf0eaabe16ab218d60a0e64c3fa568d42fcac51f867e1d2cdc1fe
- hash: cda5f18be615ad27e0477c6d249d245d368ac1de81ee48239a3e39814345c04d
- hash: f52fa1b8be929a42aafab8f0a80932e52b949ee35498f22b6d58e5e6ed107b99
- ip: 147.45.196.157
- ip: 46.8.232.106
- ip: 46.8.236.61
- ip: 91.212.166.9
- ip: 91.212.166.91
- url: https://synthient.com/blog/ghostsocks-from-initial-access-to-residential-proxy
- hash: 6d43038a57935fcf9776867ce9d3e1a3e82d0d52
- hash: 79ed3c266d878e69537b633159beba74edb0bdee
- domain: proton66.ru
- url: http://46.8.232.106:30001/api/helper-first-register?buildVersion=0pTk.PWh2DyJ&md5=&proxyPassword=&proxyUsername=&userId=
GhostSocks: From Initial Access to Residential Proxy
Description
GhostSocks is a Malware-as-a-Service (MAAS) that converts compromised devices into residential proxies, enabling threat actors to bypass anti-fraud mechanisms. Introduced in October 2023, it gained popularity after partnering with LummaStealer in February 2024. The malware, coded in Golang, uses obfuscation techniques and can be built as a 32-bit DLL or executable. It doesn't implement persistence mechanisms but focuses on SOCKS5 functionality. GhostSocks uses a configuration file or hardcoded config to connect to C2 servers, randomly generates credentials, and establishes a SOCKS5 connection using open-source libraries. Despite law enforcement actions against related platforms, GhostSocks continues to operate, posing ongoing risks of double victimization and long-term network access for cybercriminals.
AI-Powered Analysis
Technical Analysis
GhostSocks is a Malware-as-a-Service (MaaS) platform first identified in October 2023 that transforms compromised devices into residential proxies. Written in Golang, GhostSocks is designed to facilitate threat actors in bypassing anti-fraud and security mechanisms by routing malicious traffic through infected endpoints, effectively masking their origin. The malware can be deployed as either a 32-bit DLL or executable and employs obfuscation techniques to evade detection. Unlike many malware strains, GhostSocks does not implement persistence mechanisms, indicating its focus is on transient proxy functionality rather than long-term system control. It establishes SOCKS5 proxy connections using open-source libraries, with credentials randomly generated per session. Configuration is managed via either a configuration file or hardcoded parameters that direct the malware to command and control (C2) servers. GhostSocks gained traction after partnering with LummaStealer in February 2024, a credential-stealing malware, which likely aids in initial access or credential harvesting. Despite law enforcement efforts against related platforms, GhostSocks remains active, posing risks of double victimization where infected devices are used both as victims and as tools for further attacks. The malware’s ability to convert devices into residential proxies enables cybercriminals to maintain long-term network access and complicates attribution and blocking efforts by leveraging legitimate residential IP addresses. Indicators of compromise include multiple IP addresses and file hashes linked to the malware, as well as domains and URLs used for C2 communication and registration. The malware’s tactics align with several MITRE ATT&CK techniques such as obfuscation (T1027), command and control over SOCKS proxies (T1090), and credential dumping or stealing (T1219).
Potential Impact
For European organizations, GhostSocks presents a multifaceted threat. Infected devices within corporate or home networks can be covertly repurposed as proxies, enabling attackers to route malicious traffic through legitimate European IP addresses, thereby bypassing geo-restrictions and anti-fraud systems commonly used in financial services, e-commerce, and governmental sectors. This can facilitate fraud, data exfiltration, and further lateral movement within networks. The lack of persistence means infections may be transient but can recur if initial access vectors remain unmitigated. The partnership with LummaStealer suggests that credential theft is a component of the attack chain, increasing risks of account compromise and unauthorized access to sensitive systems. Additionally, the use of residential proxies complicates incident response and attribution, potentially delaying detection and remediation. The risk of double victimization means that organizations may suffer both direct compromise and indirect harm through their devices being used in broader criminal infrastructures. This can damage reputation, incur regulatory penalties under GDPR for inadequate security, and lead to financial losses from fraud or operational disruption.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Monitor network traffic for unusual SOCKS5 proxy activity, especially outbound connections to known C2 IPs and domains associated with GhostSocks. 2) Employ endpoint detection and response (EDR) solutions capable of detecting Golang-based malware and obfuscation patterns. 3) Harden initial access vectors by enforcing multi-factor authentication, especially to prevent credential theft facilitated by LummaStealer. 4) Regularly audit and restrict proxy and tunneling protocols within corporate networks to prevent unauthorized proxy usage. 5) Conduct threat hunting exercises focusing on the identified IoCs such as specific IP addresses, hashes, and domain names. 6) Educate users about phishing and credential theft risks to reduce infection likelihood. 7) Implement network segmentation to limit lateral movement and isolate infected devices quickly. 8) Collaborate with ISPs and law enforcement to report and mitigate proxy abuse originating from residential IPs. 9) Maintain updated threat intelligence feeds to detect emerging variants or related malware campaigns. 10) Since GhostSocks does not persist, rapid detection and remediation of infected hosts can effectively reduce impact.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://synthient.com/blog/ghostsocks-from-initial-access-to-residential-proxy"]
- Adversary
- GhostSocks
- Pulse Id
- 68dcdac7d51c7b3b85ad7372
- Threat Score
- null
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip86.54.24.25 | — | |
ip147.45.196.157 | — | |
ip46.8.232.106 | — | |
ip46.8.236.61 | — | |
ip91.212.166.9 | — | |
ip91.212.166.91 | — |
Hash
Value | Description | Copy |
---|---|---|
hash41dc5b08632cd0247b0ada4ed36f2b68 | — | |
hashd0eb82fd3774f614ee28f148f3681ca48677f0ff | — | |
hashb4709cfb8f9cf0eaabe16ab218d60a0e64c3fa568d42fcac51f867e1d2cdc1fe | — | |
hashcda5f18be615ad27e0477c6d249d245d368ac1de81ee48239a3e39814345c04d | — | |
hashf52fa1b8be929a42aafab8f0a80932e52b949ee35498f22b6d58e5e6ed107b99 | — | |
hash6d43038a57935fcf9776867ce9d3e1a3e82d0d52 | — | |
hash79ed3c266d878e69537b633159beba74edb0bdee | — |
Url
Value | Description | Copy |
---|---|---|
urlhttps://synthient.com/blog/ghostsocks-from-initial-access-to-residential-proxy | — | |
urlhttp://46.8.232.106:30001/api/helper-first-register?buildVersion=0pTk.PWh2DyJ&md5=&proxyPassword=&proxyUsername=&userId= | — |
Domain
Value | Description | Copy |
---|---|---|
domainproton66.ru | — |
Threat ID: 68dceb233fb6425729d8e369
Added to database: 10/1/2025, 8:49:39 AM
Last enriched: 10/1/2025, 8:50:02 AM
Last updated: 10/2/2025, 3:20:07 PM
Views: 17
Related Threats
Werewolf raids Russia's public sector with trusted relationship attacks
MediumThreat Actors Leverage SEO Poisoning and Malicious Ads to Distribute Backdoored Microsoft Teams Installers
MediumMalicious ZIP Files Use Windows Shortcuts to Drop Malware
MediumChina-linked APT Phantom Taurus uses Net-Star malware in espionage campaigns against key sectors
MediumAnalysis: AI-powered Ransomware from APT Group
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.