The extracted malware often creates a scheduled task or a new Windows service to ensure it runs automatically upon system startup [1, 5].
Typically contains a Windows executable (e.g., socks.exe or service.exe ) that functions as the SystemBC malware [2, 5]. socksonly.7z
Acts as a SOCKS5 proxy , allowing attackers to pivot through infected machines to reach other parts of a network or bypass firewalls [3, 4]. The extracted malware often creates a scheduled task
Immediately isolate any workstation where this file is discovered from the rest of the network [2]. Immediately isolate any workstation where this file is
If possible, submit the file to a secure sandbox or platform like VirusTotal to confirm the specific variant and extract Indicators of Compromise (IOCs) [1].
It communicates with hardcoded IP addresses or domains using a custom binary protocol to receive instructions from the attacker [3, 6]. Security Recommendations
Historically linked to ransomware affiliates (such as those deploying Ryuk or Conti ) who use it for lateral movement and command-and-control (C2) communication [4, 6]. Typical Behavior