← Back to SOC feed Coverage →

ThreatFox: SocksProxyGo IOCs

ioc-hunt HIGH ThreatFox
DeviceFileEventsUrlClickEvents
iocthreatfoxwin-socksproxygo
This detection content is auto-generated from open-source rule repositories and enriched with AI analysis. Always validate rules in a test environment before deploying to production Sentinel workspaces.
View original rule at ThreatFox →
Retrieved: 2026-03-19T03:46:59Z · Confidence: high

Hunt Hypothesis

Hunt package for 4 IOCs associated with SocksProxyGo

IOC Summary

Malware Family: SocksProxyGo Total IOCs: 4 IOC Types: sha256_hash, url

TypeValueThreat TypeFirst SeenConfidence
urlhxxp://45[.]76[.]21[.]42/index.jspayload_delivery2026-03-18100%
urlhxxp://45[.]76[.]21[.]42/svchost.exepayload_delivery2026-03-18100%
urlhxxp://45[.]76[.]21[.]42/3/3payload_delivery2026-03-18100%
sha256_hash1454b64b74eb655db859d3c1e2c2afc13cbb45b6173dee60923357637da17386payload2026-03-18100%

KQL: Url Hunt

// Hunt for access to known malicious URLs
// Source: ThreatFox - SocksProxyGo
let malicious_urls = dynamic(["http://45.76.21.42/index.js", "http://45.76.21.42/svchost.exe", "http://45.76.21.42/3/3"]);
UrlClickEvents
| where Url has_any (malicious_urls)
| project Timestamp, AccountUpn, Url, ActionType, IsClickedThrough
| order by Timestamp desc

KQL: Hash Hunt

// Hunt for files matching known malicious hashes
// Source: ThreatFox - SocksProxyGo
let malicious_hashes = dynamic(["1454b64b74eb655db859d3c1e2c2afc13cbb45b6173dee60923357637da17386"]);
DeviceFileEvents
| where SHA256 in (malicious_hashes) or SHA1 in (malicious_hashes) or MD5 in (malicious_hashes)
| project Timestamp, DeviceName, FileName, FolderPath, SHA256, InitiatingProcessFileName
| order by Timestamp desc

Required Data Sources

Sentinel TableNotes
DeviceFileEventsEnsure this data connector is enabled
UrlClickEventsEnsure this data connector is enabled

References

Original source: https://threatfox.abuse.ch/browse/malware/win.socksproxygo/