Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Phantom Footprints: Tracking GhostSocks Malware

0
Medium
Published: Tue Mar 31 2026 (03/31/2026, 16:14:29 UTC)
Source: AlienVault OTX General

Description

GhostSocks is a malware campaign that converts compromised devices into residential proxy nodes using the SOCKS5 protocol and TLS encryption to evade detection. Originating as Malware-as-a-Service on Russian underground forums, it is often deployed alongside Lumma Stealer, enhancing attackers' capabilities. Written in GoLang, GhostSocks enables covert network access by blending malicious traffic with legitimate activity and includes backdoor functionality for arbitrary command execution and payload deployment. Darktrace has observed increased activity of this malware in customer networks. The malware's use of residential proxies allows attackers to mask their infrastructure and complicate attribution. Indicators include specific file hashes, IP addresses, and malicious domains. The threat is medium severity due to its evasion techniques, versatility, and potential for persistent covert access without immediate destructive impact.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 19:08:21 UTC

Technical Analysis

GhostSocks is an emerging malware threat designed to transform infected devices into residential proxy nodes, facilitating attackers to route traffic through these compromised hosts and thereby evade detection and attribution. Marketed initially as Malware-as-a-Service on Russian underground forums, GhostSocks has gained traction particularly due to its operational partnership with Lumma Stealer, a known information stealer malware. The malware is developed in GoLang, which provides cross-platform capabilities and ease of deployment. GhostSocks leverages the SOCKS5 proxy protocol combined with TLS encryption to disguise malicious command-and-control (C2) traffic as legitimate network activity, complicating network-based detection efforts. Beyond proxy functionality, it incorporates backdoor capabilities allowing threat actors to execute arbitrary commands and deploy additional payloads, increasing its versatility and persistence on infected systems. Darktrace's telemetry indicates a rise in GhostSocks activity, often detected in conjunction with Lumma Stealer infections, suggesting coordinated campaigns. The malware's ability to covertly convert devices into proxy nodes enables attackers to maximize the utility of compromised infrastructure for anonymizing their operations, conducting further intrusions, or launching secondary attacks. Indicators of compromise include several file hashes, IP addresses, and domains associated with the malware's infrastructure. Although no known public exploits are reported, the malware's stealth and multi-functional nature pose significant challenges to defenders.

Potential Impact

Organizations worldwide face increased risks from GhostSocks due to its capability to covertly turn infected devices into proxy nodes, which can be exploited to anonymize attacker traffic and evade detection. This can lead to prolonged undetected intrusions, data exfiltration, and lateral movement within networks. The partnership with Lumma Stealer amplifies the threat by combining data theft with stealthy network proxying, potentially resulting in significant data breaches and operational disruption. The use of TLS encryption and SOCKS5 protocol complicates network monitoring and intrusion detection, increasing the likelihood of successful attacks. Additionally, the backdoor functionality allows attackers to deploy further malicious payloads, escalating the threat level. The malware’s presence can degrade device performance and network reliability, and compromised devices may be used to facilitate attacks against other targets, implicating victim organizations in broader malicious activities. The stealthy nature of GhostSocks increases incident response complexity and remediation costs, potentially impacting organizations’ reputation and regulatory compliance.

Mitigation Recommendations

To mitigate GhostSocks infections, organizations should implement advanced network traffic analysis capable of detecting anomalous SOCKS5 proxy usage and TLS traffic patterns inconsistent with normal operations. Deploy endpoint detection and response (EDR) solutions with behavioral analytics to identify suspicious process activities, especially those related to proxy services and backdoor command execution. Regularly update and patch all systems and software to reduce the attack surface, even though no specific patches exist for GhostSocks itself. Employ network segmentation to limit lateral movement and restrict outbound proxy connections to known and trusted services only. Monitor for the provided indicators of compromise (hashes, IPs, domains) and integrate them into intrusion detection systems and threat intelligence platforms. Conduct thorough incident response drills focusing on stealthy proxy malware and backdoor detection. Educate users about phishing and social engineering tactics that may lead to initial infection, as GhostSocks is often distributed alongside other malware like Lumma Stealer. Finally, consider deploying deception technologies to detect and disrupt proxy-based malware operations within the network.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.darktrace.com/blog/phantom-footprints-tracking-ghostsocks-malware"]
Adversary
GhostSocks
Pulse Id
69cbf2e5f01a923f01d49ea8
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashddd2994acd25bde5ac32a03f1cf30b41
hash10f928e00a1ed0181992a1e4771673566a02f4e3
hash3d9d7a7905e46a3e39a45405cb010c1baa735f9e
hash9b90c62299d4bed2e0752e2e1fc777ac50308534
hash59312a8d6663c9a404d0b5aa96b70be3946592e5c5489366e04114b11a722fa1
hashfab6525bf6e77249b74736cb74501a9491109dc7950688b3ae898354eb920413

Ip

ValueDescriptionCopy
ip86.54.24.29

Domain

ValueDescriptionCopy
domainretreaw.click
domainw2.bruggebogeyed.site
domainwww.lbfs.site

Threat ID: 69cc181be6bfc5ba1d31dd3d

Added to database: 3/31/2026, 6:53:15 PM

Last enriched: 3/31/2026, 7:08:21 PM

Last updated: 4/1/2026, 4:14:23 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses