PyPI Package Pretends to Be a SOCKS5 Proxy Tool and Targets Windows Systems
Marketed as a Python module enabling SOCKS5 service creation and network reporting via Discord webhooks, SoopSocks was withdrawn from PyPI on September 29 following the team’s disclosure of its suspicious behavior.
Early releases (v0.1.0–v0.1.2) implemented a basic SOCKS5 server. Subsequent updates (v0.2.0–v0.2.4) incorporated a Go-compiled executable named autorun.exe and added support for Windows services.
Versions 0.2.5 and 0.2.6 introduced a VBScript-based deployment path, and the latest v0.2.7 consolidated distribution into an EXE-only package. Across all versions, installation routines execute silently, elevate privileges, and ensure persistence.
The primary installer, autorun.exe, unpacks embedded PowerShell scripts, configures inbound TCP/UDP firewall rules on port 1080, and installs itself as a Windows service called SoopSocksSvc under C:Program Filessocks5svcsocks5svc.exe.
It launches PowerShell in hidden mode with execution policy bypassed, profile loading disabled, and error output suppressed, techniques designed to avoid detection. The service runs with SYSTEM privileges and uses Kardianos’s Go service library to mirror the Python module’s proxy capabilities.
Legacy VBScript installers create COM objects for WScript.Shell and Scripting.FileSystemObjectDownload a portable Python distribution from a hardcoded URL and generate a PowerShell bootstrap script. This script elevates privileges via UAC bypass, installs SoopSocks and pywin32 via pip, and executes SoopSocks in “auto” mode.
If service creation fails, it falls back to creating a scheduled task named SoopSocksAuto, which triggers on system startup and user logon.
Once active, SoopSocks listens on port 1080 without authentication, forwarding arbitrary TCP and UDP traffic.
Simultaneously, it performs network reconnaissance by querying multiple external IP services (e.g., api.ipify.org, ifconfig.me/ip) and Google’s STUN server, packaging results into JSON embeds and sending them every 30 seconds to a hardcoded Discord webhook.
Additional host fingerprinting gathers Internet Explorer security settings and Windows installation dates.
Persistence is solidified through automatic service registration, scheduled tasks, and modifications to firewall rules.
Indicators of compromise include the _autorun.exe binary, _autorun.vbs script, the SoopSocksSvc service, SoopSocksAuto task, firewall rules for TCP/UDP port 1080, and PythonPortable folders under C:PythonPortable.
SoopSocks’s blend of persistent backdoor access, unrestricted proxying, and continuous data exfiltration via Discord renders it a high risk to corporate networks.
Immediate remediation should isolate infected hosts, block connections to the Discord webhook and installer domains, remove the SoopSocks service and tasks, and revoke the firewall rules.
Security teams are advised to deploy YARA signatures targeting the SoopSocks binaries, VBScript installer patterns, and the Discord webhook URL to detect and neutralize this threat.
hxxps[:]//discord[.]com/api/webhooks/1418298773330985154/_I7EzXpGMundYt8jCvlDdzi9INsBkBq7NSDM74iV0Y_flSzQZ5LxYP0lZtXFzHCkRtKRinstall.soop.space:6969Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post PyPI Package Pretends to Be a SOCKS5 Proxy Tool and Targets Windows Systems appeared first on Cyber Security News.
Crimson Desert developer and publisher Pearl Abyss won’t show gameplay footage of the Xbox Series…
Pragmata is coming to PS5, Switch 2, Xbox, and PC on April 17. This is…
Lenovo's annual Spring Sale is well underway with this great deal on an affordable yet…
Double Fine's Kiln will launch in April across PC and consoles, following a series of…
If you don’t know The Seven Deadly Sins series – which, for context, includes over…
The latest Nite to Unite fundraiser raised $1.15 million to support undergraduate scholarships and grants…
This website uses cookies.