Spectra Assure
Community
failIncident: Malware
Scanned: 3 days ago

soopsocks

Artifact:
latest
malicious
SOCKS5 server with Discord egress + Windows auto-start (service or scheduled task)
License: Permissive (MIT)
Published: 3 months ago



SAFE Assessment

Compliance

Licenses
No license compliance issues
Secrets
No sensitive information found

Security

Vulnerabilities
1 severe vulnerabilities exploited
Hardening
1 modern mitigations missing

Threats

Tampering
2 malware-like behaviors found
Malware
3 supply chain attack artifacts

INCIDENTS FOR THIS VERSION:

malware
3 months agoReported By: Community (JFrog)
malware
3 months agoReported By: ReversingLabs (Researcher)
Learn more about malware detection

Popularity

2.81k
Total Downloads
Contributors
Declared Dependencies
0
Dependents

Top issues

Problem

Proprietary ReversingLabs malware detection algorithms have determined that the software package contains one or more malicious components. The detection was made by either a static byte signature, software component identity, or a complete file hash. This malware detection method is considered highly accurate, and can typically attribute malware to previously discovered software supply chain attacks. It is common to have multiple supply chain attack artifacts that relate to a single malware incident.

Prevalence in PyPI community

0 packages
found in
Top 100
0 packages
found in
Top 1k
11 packages
found in
Top 10k
14.01k packages
in community

Next steps

If the software intent does not relate to malicious behavior, investigate the build and release environment for software supply chain compromise.
Avoid using this software package.

Problem

Threat researchers have manually inspected the software package and determined that it contains one or more malicious files. The detection was made by a hash-based file reputation lookup. This malware detection method is considered highly accurate, and can typically identify the malware family by name.

Prevalence in PyPI community

0 packages
found in
Top 100
0 packages
found in
Top 1k
10 packages
found in
Top 10k
14.02k packages
in community

Next steps

Investigate the build and release environment for software supply chain compromise.
Avoid using this software package.

Problem

Software composition analysis has identified a component with one or more known severe vulnerabilities. Available threat intelligence telemetry has confirmed that the reported high or critical severity vulnerabilities are actively being exploited by malicious actors.

Prevalence in PyPI community

35 packages
found in
Top 100
210 packages
found in
Top 1k
1787 packages
found in
Top 10k
86.39k packages
in community

Next steps

We strongly advise updating the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.

Problem

Software composition analysis has identified a component with one or more known vulnerabilities. Available threat intelligence telemetry has confirmed that the reported vulnerabilities are actively being exploited by malicious actors. Malware code that propagates through these vulnerabilities has been created. This increases the chance of automated malware attacks affecting the software component users.

Prevalence in PyPI community

10 packages
found in
Top 100
64 packages
found in
Top 1k
555 packages
found in
Top 10k
21.15k packages
in community

Next steps

We strongly advise updating the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.

Problem

Software composition analysis has identified a component with one or more known vulnerabilities. Based on the CVSS scoring, these vulnerabilities have been marked as critical severity.

Prevalence in PyPI community

27 packages
found in
Top 100
156 packages
found in
Top 1k
1294 packages
found in
Top 10k
58.62k packages
in community

Next steps

Perform impact analysis for the reported CVEs.
We strongly advise updating the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.

Top behaviors

Prevalence in PyPI community

Behavior uncommon for this community (Uncommon)
Behavior commonly used by malicious software (Important)
1 packages
found in
Top 100
4 packages
found in
Top 1k
8 packages
found in
Top 10k
5.74k packages
in community

Prevalence in PyPI community

Behavior often found in this community (Common)
14 packages
found in
Top 100
98 packages
found in
Top 1k
585 packages
found in
Top 10k
18.68k packages
in community

Prevalence in PyPI community

Behavior often found in this community (Common)
10 packages
found in
Top 100
93 packages
found in
Top 1k
490 packages
found in
Top 10k
15.62k packages
in community

Prevalence in PyPI community

Behavior often found in this community (Common)
10 packages
found in
Top 100
78 packages
found in
Top 1k
317 packages
found in
Top 10k
9.18k packages
in community

Prevalence in PyPI community

Behavior uncommon for this community (Uncommon)
1 packages
found in
Top 100
15 packages
found in
Top 1k
113 packages
found in
Top 10k
2.15k packages
in community

Top vulnerabilities

Vulnerability Exploitation Lifecycle
(7 Active Vulnerabilities)
5 (5 Fixable)
CVE-2025-22869h
CVE-2025-47913h
CVE-2025-47914m
2 (2 Fixable)
CVE-2024-45337c
CVE-2023-48795m
1 (1 Fixable)
CVE-2023-48795m
None
Exploits Unknown
Exploits Exist
Exploited by Malware
Patching Mandated