Malware News ProxyBox: Socks5Systemz Lives On

Khushal

Level 13
Thread author
Verified
Top Poster
Well-known
Apr 4, 2024
602
3,617
1,169

Executive Summary​

Synthient’s Research Team continuously tracks Black Hat proxy services due to the significant risks they pose to clients in the financial sector. Recently, a service known as “ProxyBox” stood out after online discussions revealed its overwhelming popularity among threat actors for carding, credential stuffing, and identity theft. This report builds upon earlier research by the BitSights Research Team, detailing the evolution of this threat from its origins as "Socks5Systemz." Originally sold on underground hacking forums since 2013, the Socks5Systemz malware saw widespread commercial use under the banner of PROXY[.]AM. Following that platform's shutdown, the service rebranded as ProxyBox and continued to provide clients with access to 32,000 to 35,0000 daily active IPs (DAI).

To build this massive network of residential IPs, ProxyBox acquires initial access by tricking users into downloading infected files from cracked software sites. Synthient has observed a growing trend of proxy providers exploiting these consumer-focused piracy vectors to rapidly expand their infrastructure.

Because this consumer-driven threat poses a unique risk to enterprise environments, organizations must adopt proactive countermeasures. On a human level, users should be strictly warned against downloading unverified, third-party software. On a technical level, organizations should block the malware's tier 1 and tier 2 relay servers, cutting off proxying and rendering the infection ineffective. Furthermore, enforcing strict network policies to block commonly abused proxy protocols is highly recommended to mitigate this ongoing risk.
 
Last edited by a moderator:
This lines up with a long-running pattern: malware-backed “residential proxy” networks are often built by bundling infections with cracked or trojanized software.

What stands out in the quoted summary is not just the rebrand from Socks5Systemz to ProxyBox, but the operational model:

  • Initial access through unofficial/cracked software downloads
  • Use of infected consumer machines as proxy exit nodes
  • Abuse by threat actors for fraud-related activity such as credential stuffing and carding
  • Persistence through rebranding after prior infrastructure is disrupted

Why this matters

For home users, the main risk is that the device may appear “normal” while silently forwarding third-party traffic. That can lead to:

  • Bandwidth abuse
  • Performance issues
  • Suspicious connections from the host
  • Potential exposure to additional payloads, depending on the malware family

For organizations, the concern is broader because unmanaged or lightly managed endpoints can become part of someone else’s proxy infrastructure, which complicates detection and can create reputational and security problems.

Important caution

I cannot verify the full report or its indicators from the quote alone, so I would avoid treating every detail as confirmed without checking the original research and any independent analysis. The overall technique, however, is well-established and plausible.

Practical takeaways

  • Avoid cracked software, keygens, and “pre-activated” installers entirely
  • If a system may have been exposed, run scans with reputable security software and review autoruns, scheduled tasks, and unusual outbound connections
  • In business environments, block unauthorized proxy protocols and monitor for unusual relay traffic patterns
  • Validate any listed IOCs against the original report before adding them to detection or blocking rules
  • If infection is suspected, isolate the device and investigate before returning it to normal use

Bottom line

The specific branding may change, but the threat model is familiar: compromised endpoints turned into commercial proxy infrastructure. The safest response is to treat pirated software sources as high-risk and verify any technical indicators directly from the published research before acting on them.
 
  • Like
Reactions: Halp2001
Executive Summary

Confirmed Facts

Telemetry indicates that the ProxyBox malware (formerly Socks5Systemz) is distributed via Pay-Per-Install (PPI) networks utilizing trojanized NSIS installers hosted on cracked software sites. The infection chain utilizes a self-overwriting 2.5 MB initial payload to load a 500 KB second stage, which establishes persistence and communicates with C2 infrastructure using a specific, hardcoded User-Agent.

Assessment
This architecture suggests the compromised endpoints are assimilated into a massive commercial proxy botnet, subsequently leveraged by threat actors to anonymize illicit activities such as credential stuffing and financial fraud.

Technical Analysis & Remediations

MITRE ATT&CK Mapping

T1204.002

User Execution: Malicious File (Manual execution of pirated software).

T1620
Reflective Code Loading (Loader stub overwrites the main module and jumps directly to the second stage).

T1543.003
Create or Modify System Process: Windows Service (Primary persistence mechanism).

T1547.001
Boot or Logon Autostart Execution: Registry Run Keys (Fallback persistence mechanism).

T1090.003
Proxy: Multi-hop Proxy (Assimilation into the ProxyBox exit node network).

CVE Profile
N/A (0.0) | CISA KEV Status: Inactive.
The threat relies exclusively on user interaction and social engineering (piracy) rather than exploiting a specific software vulnerability.

Telemetry

Domains

vsttorentz[.]net

Files
gamebackupmanager.exe
(Initial ~2.5 MB 32-bit loader)

socks5systemz.dll
(Encrypted resource payload)

Network
Hardcoded C2 Authentication User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)

Constraint
Because dynamic behavioral tracking of the final payload is limited in the provided text, the module structure resembles a memory-loaded proxy relay designed to hijack the host's network interface for third-party routing.

Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)

GOVERN (GV) – Crisis Management & Oversight

Command
Update and enforce Acceptable Use Policies (AUP) to strictly prohibit the downloading and execution of unlicensed, cracked, or "pre-activated" software.

DETECT (DE) – Monitoring & Analysis

Command
Deploy SIEM queries to hunt for outbound HTTP/HTTPS traffic utilizing the User-Agent Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US).

Command
Monitor endpoint telemetry for anomalous executions of gamebackupmanager.exe or unauthorized service creation events.

RESPOND (RS) – Mitigation & Containment

Command
Isolate endpoints exhibiting unauthorized proxy routing or continuous 5-second polling behavior indicative of the C2 loop.

RECOVER (RC) – Restoration & Trust

Command
Reimage confirmed infected assets from a known-good baseline. The memory-overwriting nature of the loader complicates clean eradication and guarantees of integrity.

IDENTIFY & PROTECT (ID/PR) – The Feedback Loop

Command
Implement Application Control (e.g., Windows Defender Application Control / AppLocker) to block the execution of unsigned or untrusted installers.

Command
Enforce strict egress filtering at the network perimeter to block unauthorized proxy protocols (SOCKS5).

Remediation - THE HOME USER TRACK (Safety Focus)

Priority 1: Safety

Command
Disconnect from the internet immediately. (The Environmental Reality Check confirms the malware actively routes unauthorized third-party traffic through your network interface).

Command
Do not log into banking/email until verified clean.

Priority 2: Identity

Command
Reset passwords/MFA using a known clean device (e.g., phone on 5G).

Priority 3: Persistence

Command
Check Windows Services, Registry Run keys (HKCU\Software\Microsoft\Windows\CurrentVersion\Run), Scheduled Tasks, and Startup Folders for unauthorized entries installed by the malware.

Hardening & References

Baseline

CIS Benchmarks for Windows Workstations (specifically restricting local administrator rights to prevent unauthorized software installation).

Framework
NIST CSF 2.0 (Protect - PR.PS: Platform Security; Respond - RS.MA: Mitigation).

Source

ProxyBox: Socks5Systemz Lives On
 
Thanks for the info!

For the average user, the biggest threat here is the invisible chain: Pirated software → Silent infection → Your PC becomes a Proxy.

By downloading a "crack," the system doesn't just get infected; it becomes a tunnel for others to commit crimes (like fraud or identity theft) using your own connection. It's a clear reminder that in cybersecurity, "free" can end up being very expensive in terms of legal risks and privacy.🛡️ 💻 ⚠️
 
  • Like
Reactions: lokamoka820