Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Socks5Systemz

105
Global rank
82 infographic chevron month
Month rank
80 infographic chevron week
Week rank
0
IOCs

Socks5systemz is a botnet that utilizes its infection capabilities to establish a network of compromised devices. These devices are then used to forward malicious traffic. The criminals behind this malware sell access to the infected endpoints to other threat actors. Socks5systemz maintains control over thousands of devices and communicates with them using specific commands.

Botnet
Type
Unknown
Origin
1 April, 2017
First seen
17 December, 2025
Last seen

How to analyze Socks5Systemz with ANY.RUN

Type
Unknown
Origin
1 April, 2017
First seen
17 December, 2025
Last seen

IOCs

IP addresses
192.151.149.114
178.16.55.188
74.91.19.130
51.255.81.133
5.135.136.152
45.11.182.82
178.16.53.192
86.54.42.188
69.197.159.18
62.210.116.204
66.63.187.153
95.215.206.151
176.113.115.96
176.10.111.126
194.62.105.143
109.236.88.134
188.165.192.18
37.187.148.204
217.23.5.14
193.242.211.141
Domains
ejvphud.ua
gdpkvkr.com
bwiesit.com
goeiwef.com
kruxjou.ua
Last Seen at
Last Seen at

Recent blog posts

post image
Year in Review by ANY.RUN: Key Threats, Solut...
watchers 2384
comments 0
post image
5 Ways Threat Intelligence Drives ROI in SOCs...
watchers 481
comments 0
post image
SOC Leader’s Playbook: 3 Practical Steps to F...
watchers 495
comments 0

What is Socks5systemz malware?

Socks5Systemz is a botnet that has been observed by threat researchers since 2017, with a significant spike in activity in 2023. Notably, the first sample of the malware uploaded to ANY.RUN's public database dates back to 2020.

Unlike botnets such as Mirai, which primarily infect devices to use them in distributed denial-of-service (DDoS) attacks, Socks5Systemz is mainly utilized for creating networks of compromised devices to rent out as proxies. Attackers sell subscriptions to their proxy services, enabling malicious actors to leverage bots to forward traffic through them. This allows them to hide the original source of the traffic and bypass security systems designed to detect malicious traffic.

Since its launch, Socks5Systemz has infected more than ten thousand systems worldwide. Often dropped by loaders like PrivateLoader and Amadey, the botnet mostly targets endpoints in India, the United States, Europe, and countries in Africa. At the same time, Socks5Systemz can enter devices through other means, including phishing emails and malvertising.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Socks5systemz malware technical details

As mentioned, Socks5systemz botnet focuses on compromising devices to resell access to them as part of a proxy-for-rent scheme.

The malware employs two distinct types of Command and Control (C2) connections for its communication, distributing roles between two servers and creating a complex and efficient system for managing its operations.

The first type of connection is the HTTP/80 C2 connection. This connection is primarily used for communication between the bot and the server. The second type of connection is the TCP/1074 Client connection streams and proxy server commands. This connection is responsible for managing client streams and executing proxy server commands.

Socks5systemz infographic Socks5Systemz network traffic

The Socks5Systemz proxy bot binds TCP/1074 sockets to facilitate communication with the proxy server. The first packet, which is one byte long, determines the type of command being sent. These commands can be one of three types: 0x00, 0x01, or 0x02.

An alive command connection on TCP/1074 is used to convey messages from the server. These messages describe client streams and are structured as follows:

  • Address type (IP/domain)
  • Destination address (IP/domain)
  • Destination Port
  • Connection ID

When server commands are received, the proxy bot executes a series of steps in response. It transmits a 0x01 command packet type to the TCP/1074. Subsequently, it dispatches a 10-byte packet containing the client connection ID. Lastly, it forwards data from the proxy-server clients to the internet.

This particular method of interaction with a pair of servers enables the proxy bot to maintain its online status with the C2 server, facilitating updates to proxy addresses, and with the proxy server, allowing it to accept new client streams.

Some versions of the malware have been observed to connect to domains that were automatically generated with the help of algorithms (DGA).

Socks5systemz execution process

To study the behavior of Socks5Systemz closely, we can upload its sample to the ANY.RUN sandbox.

Threat actors often employ malware loaders to deliver the Socks5Systemz payload, setting up persistence and injecting the proxy bot into the system. The malware uses a custom command and control protocol to communicate with threat actor-controlled servers, mimicking well-known protocols or developing custom ones.

The malware may maintain persistence by creating a Windows service to run the loader. It evades detection using a domain generation algorithm and supports commands like connecting to backconnect servers to serve as proxies.

The malware's execution chain involves initial delivery, command and control communication, persistence setup, proxy injection, and malicious activity execution, all aimed at facilitating cybercriminal operations and evading detection.

Socks5systemz Suricata rule in ANY.RUN Socks5systemz Suricata rule shown in ANY.RUN

Socks5systemz malware distribution methods

Socks5Systemz is commonly delivered via loaders, such as PrivateLoader and CrackedCantil. These drop the malware on compromised systems and allow it to begin the infection process.

Some attacks involving Socks5Systemz are also performed via phishing emails. Criminals can employ various social engineering tactics to trick victims into downloading and executing the malware on their devices.

Conclusion

Socks5systemz continues to be used in attacks on both individuals and organizations. To prevent it from taking over your system, it is crucial to undertake proactive measures. One of them is using a sandbox to analyze suspicious files and URLs.

ANY.RUN is a cloud-based sandbox service that helps users detect malware families like Socks5systemz. It provides a detailed view of the behavior of any malware in a secure environment. ANY.RUN supplies reports on the analyzed threats, containing crucial information such as indicators of compromise and TTPs. These reports are useful for making informed security decisions.

Create your ANY.RUN account – it’s free!

HAVE A LOOK AT

Loader screenshot
Loader
loader downloader
A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.
Read More
Phobos screenshot
Phobos
phobos ransomware
Phobos is a ransomware that locks or encrypts files to demand a ransom. It uses AES encryption with different extensions, which leaves no chance to recover the infected files.
Read More
EvilProxy screenshot
EvilProxy
evilproxy
EvilProxy is a phishing-as-a-service (PhaaS) platform that enables cybercriminals to bypass multi-factor authentication (MFA) and hijack user sessions. It leverages reverse proxy techniques to harvest credentials and session cookies, posing a serious threat to both individuals and enterprises.
Read More
LokiBot screenshot
LokiBot
lokibot loader trojan
LokiBot was developed in 2015 to steal information from a variety of applications. Despite the age, this malware is still rather popular among cybercriminals.
Read More
Botnet screenshot
Botnet
botnet
A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.
Read More
PureCrypter screenshot
PureCrypter
purecrypter
First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.
Read More