GhostSocks is a highly sophisticated SOCKS5 backconnect proxy malware written in the Go programming language. It primarily targets Windows and Linux devices, allowing cybercriminals to use compromised machines as proxy servers for malicious activities. The malware first emerged in Autumn 2023 on Russian hacker forums and has been linked to the LummaC2 stealer, indicating a strong connection between the developers of these two threats.
GhostSocks is offered as Malware-as-a-Service (MaaS), with discounts provided for LummaC2 users. This malware is highly stealthy, obfuscated, and equipped with anti-detection mechanisms, making it a formidable threat to cybersecurity.
GhostSocks Malware Overview
Threat Summary Table
Category | Details |
---|---|
Name | GhostSocks Virus |
Threat Type | Trojan, Backconnect Proxy Malware |
Detection Names | Avast (Win64:Evo-gen [Trj]), Combo Cleaner (Trojan.GenericKD.75595724), ESET-NOD32 (A Variant Of Win64/GenKryptik.HFUJ), Kaspersky (Trojan.Win32.Injuke.osan), Microsoft (Trojan:Win32/Multiverze) |
Symptoms of Infection | No obvious symptoms; operates stealthily in the background |
Damage Potential | Stolen credentials, financial fraud, identity theft, device added to a botnet, introduction of additional malware |
Distribution Methods | Malicious email attachments, social engineering, software cracks, infected online advertisements |
Danger Level | Extremely high (stealthy, allows further malware infections, facilitates cybercrime) |

Remove
GhostSocks Malware
With SpyHunter
Download SpyHunter now, and scan your computer for this and other cybersecurity threats for free!
How GhostSocks Malware Works
GhostSocks operates as a SOCKS5 backconnect proxy malware, meaning that infected devices establish a connection to the attacker’s infrastructure instead of the attacker connecting directly to them. This allows cybercriminals to:
- Evade geolocation restrictions and appear as if they are connecting from the victim's location.
- Bypass security checks that rely on IP verification.
- Commit fraud anonymously, making tracing their activities extremely difficult.
- Use infected devices as relays for additional cyberattacks.
GhostSocks is often deployed alongside LummaC2 stealer, which specializes in stealing:
- Login credentials
- Multi-Factor Authentication (MFA) codes
- Cryptocurrency wallet data
- Other sensitive personal and financial information
With the combination of GhostSocks and LummaC2, cybercriminals can not only steal valuable data but also bypass security measures that prevent unauthorized access.
How to Remove GhostSocks Malware

Remove
GhostSocks Malware
With SpyHunter
Download SpyHunter now, and scan your computer for this and other cybersecurity threats for free!
To eliminate GhostSocks from your system, follow this comprehensive removal guide:
Step 1: Disconnect From the Internet
- Unplug your Ethernet cable or disable Wi-Fi.
- This prevents the malware from communicating with its remote server.
Step 2: Reboot Your PC in Safe Mode
- Windows:
- Press Win + R, type
msconfig
, and hit Enter. - Go to the Boot tab and check Safe Boot (select Network if you need to download SpyHunter).
- Click Apply > OK and restart your PC.
- Press Win + R, type
- Linux:
- Reboot and select Advanced options in the GRUB menu.
- Choose Recovery mode and select Root shell.
Step 3: Use SpyHunter to Scan for Malware
- Download SpyHunter.
- Install and run a full system scan.
- Remove all detected threats.
- Restart your PC to complete the removal process.
Step 4: Delete Malicious Entries from the Registry (Windows Only)
- Press Win + R, type
regedit
, and hit Enter. - Navigate to:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- Look for suspicious entries related to GhostSocks.
- Right-click and delete them.
Step 5: Check and Remove Malicious Processes
- Press Ctrl + Shift + Esc to open Task Manager.
- Look for suspicious processes (e.g., unknown Go-based applications).
- Right-click and End Task.
Step 6: Remove Suspicious Programs
- Press Win + R, type
appwiz.cpl
, and hit Enter. - Look for unknown or suspicious programs.
- Click Uninstall.
Step 7: Clear Temporary Files
- Press Win + R, type
%temp%
, and hit Enter. - Select all files and delete them.
How to Prevent Future Infections
To avoid getting infected by GhostSocks or similar malware in the future, follow these cybersecurity best practices:
Use Reliable Security Software
- Install SpyHunter or another reputable anti-malware tool.
- Enable real-time protection and keep virus definitions up to date.
Avoid Clicking on Suspicious Links and Attachments
- Never open email attachments from unknown senders.
- Avoid clicking on links in unsolicited emails.
- Be wary of social engineering attacks.
Download Software Only from Official Sources
- Avoid downloading software cracks or pirated programs.
- Always download from official websites.
Enable Multi-Factor Authentication (MFA)
Even if credentials are stolen, MFA can prevent unauthorized access.
Keep Your OS and Applications Updated
- Regularly update Windows, Linux, and installed software.
- Apply security patches as soon as they are released.
Monitor Network Traffic for Unusual Activity
- Use firewalls and network monitoring tools.
- Look for unexpected outbound connections.
Conclusion
GhostSocks is an advanced SOCKS5 backconnect proxy malware that enables cybercriminals to anonymize their actions, steal sensitive data, and conduct fraudulent activities. It is commonly used alongside LummaC2 stealer, making it a significant threat to financial security and privacy.
By following the detailed removal guide using SpyHunter and implementing strong cybersecurity practices, users can effectively eliminate GhostSocks and protect themselves from future infections.

Remove
GhostSocks Malware
With SpyHunter
Download SpyHunter now, and scan your computer for this and other cybersecurity threats for free!