Socksonly.7z ❲TRUSTED❳
Historically linked to ransomware affiliates (such as those deploying Ryuk or Conti ) who use it for lateral movement and command-and-control (C2) communication [4, 6]. Typical Behavior
The extracted malware often creates a scheduled task or a new Windows service to ensure it runs automatically upon system startup [1, 5]. socksonly.7z
Often dropped into directories like C:\ProgramData\ or %TEMP% after an initial breach (via phishing or RDP exploits) [2, 5]. Historically linked to ransomware affiliates (such as those
If possible, submit the file to a secure sandbox or platform like VirusTotal to confirm the specific variant and extract Indicators of Compromise (IOCs) [1]. If possible, submit the file to a secure
Immediately isolate any workstation where this file is discovered from the rest of the network [2].
The file is a compressed archive frequently associated with malware distribution , specifically related to the deployment of SystemBC , a remote access trojan (RAT) and SOCKS5 proxy [1, 2]. It is commonly used by cybercriminals to establish encrypted tunnels and hide malicious traffic within a compromised network [2, 3]. Technical Summary File Type: 7-Zip Compressed Archive (.7z) [1].