Phantom Footprints: Tracking GhostSocks Malware
GhostSocks is a malware campaign that converts compromised devices into residential proxy nodes using the SOCKS5 protocol and TLS encryption to evade detection. Originating as Malware-as-a-Service on Russian underground forums, it is often deployed alongside Lumma Stealer, enhancing attackers' capabilities. Written in GoLang, GhostSocks enables covert network access by blending malicious traffic with legitimate activity and includes backdoor functionality for arbitrary command execution and payload deployment. Darktrace has observed increased activity of this malware in customer networks. The malware's use of residential proxies allows attackers to mask their infrastructure and complicate attribution. Indicators include specific file hashes, IP addresses, and malicious domains. The threat is medium severity due to its evasion techniques, versatility, and potential for persistent covert access without immediate destructive impact.
AI Analysis
Technical Summary
GhostSocks is an emerging malware threat designed to transform infected devices into residential proxy nodes, facilitating attackers to route traffic through these compromised hosts and thereby evade detection and attribution. Marketed initially as Malware-as-a-Service on Russian underground forums, GhostSocks has gained traction particularly due to its operational partnership with Lumma Stealer, a known information stealer malware. The malware is developed in GoLang, which provides cross-platform capabilities and ease of deployment. GhostSocks leverages the SOCKS5 proxy protocol combined with TLS encryption to disguise malicious command-and-control (C2) traffic as legitimate network activity, complicating network-based detection efforts. Beyond proxy functionality, it incorporates backdoor capabilities allowing threat actors to execute arbitrary commands and deploy additional payloads, increasing its versatility and persistence on infected systems. Darktrace's telemetry indicates a rise in GhostSocks activity, often detected in conjunction with Lumma Stealer infections, suggesting coordinated campaigns. The malware's ability to covertly convert devices into proxy nodes enables attackers to maximize the utility of compromised infrastructure for anonymizing their operations, conducting further intrusions, or launching secondary attacks. Indicators of compromise include several file hashes, IP addresses, and domains associated with the malware's infrastructure. Although no known public exploits are reported, the malware's stealth and multi-functional nature pose significant challenges to defenders.
Potential Impact
Organizations worldwide face increased risks from GhostSocks due to its capability to covertly turn infected devices into proxy nodes, which can be exploited to anonymize attacker traffic and evade detection. This can lead to prolonged undetected intrusions, data exfiltration, and lateral movement within networks. The partnership with Lumma Stealer amplifies the threat by combining data theft with stealthy network proxying, potentially resulting in significant data breaches and operational disruption. The use of TLS encryption and SOCKS5 protocol complicates network monitoring and intrusion detection, increasing the likelihood of successful attacks. Additionally, the backdoor functionality allows attackers to deploy further malicious payloads, escalating the threat level. The malware’s presence can degrade device performance and network reliability, and compromised devices may be used to facilitate attacks against other targets, implicating victim organizations in broader malicious activities. The stealthy nature of GhostSocks increases incident response complexity and remediation costs, potentially impacting organizations’ reputation and regulatory compliance.
Mitigation Recommendations
To mitigate GhostSocks infections, organizations should implement advanced network traffic analysis capable of detecting anomalous SOCKS5 proxy usage and TLS traffic patterns inconsistent with normal operations. Deploy endpoint detection and response (EDR) solutions with behavioral analytics to identify suspicious process activities, especially those related to proxy services and backdoor command execution. Regularly update and patch all systems and software to reduce the attack surface, even though no specific patches exist for GhostSocks itself. Employ network segmentation to limit lateral movement and restrict outbound proxy connections to known and trusted services only. Monitor for the provided indicators of compromise (hashes, IPs, domains) and integrate them into intrusion detection systems and threat intelligence platforms. Conduct thorough incident response drills focusing on stealthy proxy malware and backdoor detection. Educate users about phishing and social engineering tactics that may lead to initial infection, as GhostSocks is often distributed alongside other malware like Lumma Stealer. Finally, consider deploying deception technologies to detect and disrupt proxy-based malware operations within the network.
Affected Countries
United States, Russia, Germany, United Kingdom, France, Netherlands, Ukraine, Canada, Australia, Japan
Indicators of Compromise
- hash: ddd2994acd25bde5ac32a03f1cf30b41
- hash: 10f928e00a1ed0181992a1e4771673566a02f4e3
- hash: 3d9d7a7905e46a3e39a45405cb010c1baa735f9e
- hash: 9b90c62299d4bed2e0752e2e1fc777ac50308534
- hash: 59312a8d6663c9a404d0b5aa96b70be3946592e5c5489366e04114b11a722fa1
- hash: fab6525bf6e77249b74736cb74501a9491109dc7950688b3ae898354eb920413
- ip: 86.54.24.29
- domain: retreaw.click
- domain: w2.bruggebogeyed.site
- domain: www.lbfs.site
Phantom Footprints: Tracking GhostSocks Malware
Description
GhostSocks is a malware campaign that converts compromised devices into residential proxy nodes using the SOCKS5 protocol and TLS encryption to evade detection. Originating as Malware-as-a-Service on Russian underground forums, it is often deployed alongside Lumma Stealer, enhancing attackers' capabilities. Written in GoLang, GhostSocks enables covert network access by blending malicious traffic with legitimate activity and includes backdoor functionality for arbitrary command execution and payload deployment. Darktrace has observed increased activity of this malware in customer networks. The malware's use of residential proxies allows attackers to mask their infrastructure and complicate attribution. Indicators include specific file hashes, IP addresses, and malicious domains. The threat is medium severity due to its evasion techniques, versatility, and potential for persistent covert access without immediate destructive impact.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
GhostSocks is an emerging malware threat designed to transform infected devices into residential proxy nodes, facilitating attackers to route traffic through these compromised hosts and thereby evade detection and attribution. Marketed initially as Malware-as-a-Service on Russian underground forums, GhostSocks has gained traction particularly due to its operational partnership with Lumma Stealer, a known information stealer malware. The malware is developed in GoLang, which provides cross-platform capabilities and ease of deployment. GhostSocks leverages the SOCKS5 proxy protocol combined with TLS encryption to disguise malicious command-and-control (C2) traffic as legitimate network activity, complicating network-based detection efforts. Beyond proxy functionality, it incorporates backdoor capabilities allowing threat actors to execute arbitrary commands and deploy additional payloads, increasing its versatility and persistence on infected systems. Darktrace's telemetry indicates a rise in GhostSocks activity, often detected in conjunction with Lumma Stealer infections, suggesting coordinated campaigns. The malware's ability to covertly convert devices into proxy nodes enables attackers to maximize the utility of compromised infrastructure for anonymizing their operations, conducting further intrusions, or launching secondary attacks. Indicators of compromise include several file hashes, IP addresses, and domains associated with the malware's infrastructure. Although no known public exploits are reported, the malware's stealth and multi-functional nature pose significant challenges to defenders.
Potential Impact
Organizations worldwide face increased risks from GhostSocks due to its capability to covertly turn infected devices into proxy nodes, which can be exploited to anonymize attacker traffic and evade detection. This can lead to prolonged undetected intrusions, data exfiltration, and lateral movement within networks. The partnership with Lumma Stealer amplifies the threat by combining data theft with stealthy network proxying, potentially resulting in significant data breaches and operational disruption. The use of TLS encryption and SOCKS5 protocol complicates network monitoring and intrusion detection, increasing the likelihood of successful attacks. Additionally, the backdoor functionality allows attackers to deploy further malicious payloads, escalating the threat level. The malware’s presence can degrade device performance and network reliability, and compromised devices may be used to facilitate attacks against other targets, implicating victim organizations in broader malicious activities. The stealthy nature of GhostSocks increases incident response complexity and remediation costs, potentially impacting organizations’ reputation and regulatory compliance.
Mitigation Recommendations
To mitigate GhostSocks infections, organizations should implement advanced network traffic analysis capable of detecting anomalous SOCKS5 proxy usage and TLS traffic patterns inconsistent with normal operations. Deploy endpoint detection and response (EDR) solutions with behavioral analytics to identify suspicious process activities, especially those related to proxy services and backdoor command execution. Regularly update and patch all systems and software to reduce the attack surface, even though no specific patches exist for GhostSocks itself. Employ network segmentation to limit lateral movement and restrict outbound proxy connections to known and trusted services only. Monitor for the provided indicators of compromise (hashes, IPs, domains) and integrate them into intrusion detection systems and threat intelligence platforms. Conduct thorough incident response drills focusing on stealthy proxy malware and backdoor detection. Educate users about phishing and social engineering tactics that may lead to initial infection, as GhostSocks is often distributed alongside other malware like Lumma Stealer. Finally, consider deploying deception technologies to detect and disrupt proxy-based malware operations within the network.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.darktrace.com/blog/phantom-footprints-tracking-ghostsocks-malware"]
- Adversary
- GhostSocks
- Pulse Id
- 69cbf2e5f01a923f01d49ea8
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashddd2994acd25bde5ac32a03f1cf30b41 | — | |
hash10f928e00a1ed0181992a1e4771673566a02f4e3 | — | |
hash3d9d7a7905e46a3e39a45405cb010c1baa735f9e | — | |
hash9b90c62299d4bed2e0752e2e1fc777ac50308534 | — | |
hash59312a8d6663c9a404d0b5aa96b70be3946592e5c5489366e04114b11a722fa1 | — | |
hashfab6525bf6e77249b74736cb74501a9491109dc7950688b3ae898354eb920413 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip86.54.24.29 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainretreaw.click | — | |
domainw2.bruggebogeyed.site | — | |
domainwww.lbfs.site | — |
Threat ID: 69cc181be6bfc5ba1d31dd3d
Added to database: 3/31/2026, 6:53:15 PM
Last enriched: 3/31/2026, 7:08:21 PM
Last updated: 4/1/2026, 4:14:23 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.