{"id":12686,"date":"2021-03-15T10:27:50","date_gmt":"2021-03-15T10:27:50","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=12686"},"modified":"2026-04-17T18:07:46","modified_gmt":"2026-04-17T18:07:46","slug":"freakout-analysis-report-1","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/freakout-analysis-report-1\/","title":{"rendered":"&#8216;FreakOut&#8217; Malware Analysis &#8211; Groups Behind FreakOut"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><strong>Produced by: NSFOCUS Security Labs<\/strong><\/p>\n\n\n\n<p>In early January 2021, NSFOCUS Security Labs captured an unknown malicious program called &#8220;out.py&#8221; via its real-time data platform, which is usually spread with the domain name &#8220;gxbrowser.net&#8221;. NSFOCUS Security Labs conducted an in-depth research on the samples and payloads of the malware and compared the malware with NSFOCUS threat intelligence, concluding that the malware belonged to a new type of botnet family.<\/p>\n\n\n\n<p>In mid- and late January 2021, many companies also detected the malware. Since it was called out.py and associated with the attacker dubbed Freak, it was named FreakOut. The malware was spread exploiting three vulnerabilities:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>CVE-2020-28188 (TerraMaster TOS unauthorized remote command execution (RCE)<\/li><li>CVE-2020-7961 (Liferay Portal code execution vulnerability)<\/li><li>CVE-2021-3007 (Zend Framework deserialization vulnerability)<\/li><\/ul>\n\n\n\n<p>Disclosed around January 3, 2021, the vulnerability assigned CVE-2021-3007 was quickly exploited by hacking groups within a week. A further analysis reveals the operator and seller behind the malware. This article elaborates on how FreakOut-related information was associated and how the group behind the malware evolved.<\/p>\n\n\n\n<p><strong>Attacker<\/strong><\/p>\n\n\n\n<p>By tracing, we found that FreakOut is not a new malicious family but a product of years&#8217; evolution. necro.py, a version recently used by the attacker, retained comments and revealed names of the botnet and attacker.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"670\" height=\"305\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12690\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/1.jpg 670w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/1-300x137.jpg 300w\" sizes=\"(max-width: 670px) 100vw, 670px\" \/><\/figure>\n\n\n\n<p>The attacker group behind the FreakOut campaign has years of history. As a Trojan for distributed denial of service (DDoS) attacks written in Python, FreakOut is only one of the numerous hacking tools developed or used by the attacker group. Early in 2014, the attacker with the screen name Fl0urite wrote DDoS Trojans in Python at HackThisSite. In 2015, they published a post at HackThisSite with the same name, which mentioned the N3cr0m0rph IRC botnet. It can be seen that the botnet had begun to take shape at that time. Afterwards, the attacker name Fl0urite was rarely seen probably due to some changes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"419\" height=\"275\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12691\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/2.jpg 419w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/2-300x197.jpg 300w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"612\" height=\"115\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12692\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/3.jpg 612w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/3-300x56.jpg 300w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/figure>\n\n\n\n<p>Besides, the attacker registered an account N3Cr0M0rPh at Stackoverflow. The Pastebin page linked from a post stored botnet-related tools and Trojan code, which are still active.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"997\" height=\"615\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12693\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/4.jpg 997w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/4-300x185.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/4-768x474.jpg 768w\" sizes=\"(max-width: 997px) 100vw, 997px\" \/><\/figure>\n\n\n\n<p><strong>Attacker Footprints<\/strong><\/p>\n\n\n\n<p>By analyzing the files shared at Pastebin, we obtained the following IDs that had been used by the attacker and the related group:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/5.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12695\" width=\"442\" height=\"145\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/5.png 883w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/5-300x99.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/5-768x252.png 768w\" sizes=\"(max-width: 442px) 100vw, 442px\" \/><\/figure>\n\n\n\n<p>Based on these IDs and information found in Trojan programs, we got an association map as shown below.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"662\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/222-1024x662.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12723\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/222-1024x662.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/222-300x194.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/222-768x497.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/222.png 1218w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Through the association, we confirmed that FreakOut developers acted in the following three groups:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/7.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12697\" width=\"469\" height=\"230\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/7.png 937w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/7-300x147.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/7-768x377.png 768w\" sizes=\"(max-width: 469px) 100vw, 469px\" \/><\/figure>\n\n\n\n<p>In terms of active time, Salamander Squad, PopulusControl, and Kek Security showed a clear iterative relationship, which may be related to changes in the group&#8217;s main developers. In addition, we confirmed some members of the preceding groups:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/8-1024x717.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12698\" width=\"512\" height=\"359\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/8-1024x717.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/8-300x210.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/8-768x538.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/8.png 1027w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure>\n\n\n\n<p>Therefore, we can confirm the development path of the group behind FreakOut.<\/p>\n\n\n\n<p>Freak, one of the main developers of FreakOut, was a member of Salamander Squad as early as 2014, a DDoS botnet operating team. Before long, this person joined (or founded) PopulusControl, to which the developer nicknamed Binary belonged, to continue operating the DDoS botnet.<\/p>\n\n\n\n<p>When PopulusControl prevailed, its members were active at a hacker forum called BullyWiiHacks and kept in contact with one another via the IRC channel. Registered users of BullyWiiHacks, such as shitnbitch, thedetonator, and shadow, were also PopulusControl members. <\/p>\n\n\n\n<p>At the end of 2014, Binary claimed to leave PopulusControl to start his\/her own business and took away some of the members. Since then, Freak undertook most development tasks of PopulusControl. During this period, Freak updated multiple versions of CancerNet and n3cr0m0rph Python IRC bot programs, which were the predecessors of the FreakOut Trojan.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"487\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/9-1024x487.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12699\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/9-1024x487.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/9-300x143.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/9-768x365.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/9.jpg 1507w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In 2016, Freak joined (or founded) KeK Security (Keksec), a hacker group. Apart from continuing botnet operations, Keksec carried out blatant hacking activities, including hacking billboards (https:\/\/hacked.wtf\/hacker-news\/keksec-on-billboard-security\/2019\/09\/17\/) and boasting of its intrusion results at Twitter. The following figure displayed a tweet that Keksec copied to a billboard one tweet of John McAfee, the founder of McAfee, and forwarded another tweet of John McAfee online.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/10.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12700\" width=\"414\" height=\"477\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/10.jpg 828w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/10-260x300.jpg 260w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/10-768x885.jpg 768w\" sizes=\"(max-width: 414px) 100vw, 414px\" \/><\/figure>\n\n\n\n<p>Freak created variants of multiple open-source IoT Trojans and put them into use. Such variants were usually named keksec.[platform], such as keksec.x86 and keksec.arm7. <\/p>\n\n\n\n<p>Page information of relevant groups is as follows:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11-1.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12703\" width=\"473\" height=\"188\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11-1.png 945w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11-1-300x119.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11-1-768x306.png 768w\" sizes=\"(max-width: 473px) 100vw, 473px\" \/><\/figure>\n\n\n\n<p><strong>Group Business Behaviors<\/strong><\/p>\n\n\n\n<p>Freak and Kek Security mainly seek profits by selling hacking software and DDoS resources. The sales activities of Freak and relevant groups can be found in their forum movements.<\/p>\n\n\n\n<p>In 2020, a user named Freak_OG of Hackforums published a post on June 17, 2020, claiming to provide free installation packages for private cryptomining. On December 6, 2020, the user attempted to sell one silent Miner for USD 25.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"505\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/12-1024x505.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12704\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/12-1024x505.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/12-300x148.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/12-768x379.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/12.jpg 1338w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The cryptomining tool using XMRIG v6.6.2 contained various types of properties and supported multiple terms of payment. In order to promote the tool, the user posted some screenshots to prove its profitability. <\/p>\n\n\n\n<p>On December 1, 2020, Freak_OG published a post to sell a botnet Trojan called DarkHTTP Loader for USD 50. The Trojan provided a control panel and fulfilled multiple functions, such as spreading via intranets, file theft, and spreading via USB. It could also conduct brute-force attacks on SMB\/MSSQL\/MYSQL protocols.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"915\" height=\"634\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/13.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12705\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/13.jpg 915w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/13-300x208.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/13-768x532.jpg 768w\" sizes=\"(max-width: 915px) 100vw, 915px\" \/><\/figure>\n\n\n\n<p>In addition, Freak_OG sold a Windows Trojan called DarkIRC for USD 75. The Trojan was spread via WebLogic vulnerabilities and could perform malicious behaviors, such as launching DDoS attacks, logging keystrokes, downloading executables, executing shell commands, stealing browser credentials, and hijacking Bitcoin transactions.<\/p>\n\n\n\n<p>However, the group failed to keep covert and attracted the attention of researchers. In a post, the user commented on researchers revealing his behaviors and admitted having sold Trojans and launched the attack.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"307\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/14-1024x307.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12706\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/14-1024x307.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/14-300x90.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/14-768x231.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/14.jpg 1256w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Anyway, Kek Security has been seeking methods to cash in on its own resources.<\/p>\n\n\n\n<p><strong>Links with Other Botnet Families<\/strong><\/p>\n\n\n\n<p>Besides such a Python DDoS family as FreakOut, Freak and KeK Security operate other botnet families and share C&amp;C infrastructure.<\/p>\n\n\n\n<p>KeK Security exploits IRCBot and Tsunami IRC families for DDoS activities. It also uses Freak, keksec, or kek as the name of an IRC channel that had a maximum capacity of 1214 users, most of whom came from the USA.<\/p>\n\n\n\n<p>Kek Security operates HybridMQ-keksec, a botnet created with Trojan programs. HybridMQ-keksec is a DDoS Trojan program obtained by combining and modifying the source code of Mirai and Gafgyt. It mainly uses Huawei HG532 router command injection and ThinkPHP remote command execution vulnerabilities for propagation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/15.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12707\" width=\"506\" height=\"289\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/15.jpg 1011w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/15-300x171.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/15-768x438.jpg 768w\" sizes=\"(max-width: 506px) 100vw, 506px\" \/><\/figure>\n\n\n\n<p>Some HybridMQ-keksec Trojan programs have new functions and could check raw TCP network traffic received. If HTTP, FTP, and SMTP services are involved, these programs transmit port and data information to C&amp;C servers. Such an operation is rare in DDoS families on Linux and IoT platforms. This allows attackers to exploit the victim&#8217;s host to conduct DDoS attacks and steal unencrypted communication data from the victim&#8217;s host to facilitate potential intranet infiltration or targeted attacks.<\/p>\n\n\n\n<p>Read the second part:<\/p>\n\n\n\n<p><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/freakout-malware-analysis-freakout-samples\/\">&acirc;&euro;&tilde;FreakOut&acirc;&euro;&trade; Malware Analysis &acirc;&euro;&ldquo; FreakOut Samples<\/a><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Produced by: NSFOCUS Security Labs In early January 2021, NSFOCUS Security Labs captured an unknown malicious program called &#8220;out.py&#8221; via its real-time data platform, which is usually spread with the domain name &#8220;gxbrowser.net&#8221;. NSFOCUS Security Labs conducted an in-depth research on the samples and payloads of the malware and compared the malware with NSFOCUS threat [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":12722,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,5],"tags":[506],"class_list":["post-12686","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ddos-mitigation","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&#039;FreakOut&#039; Malware Analysis - Groups Behind FreakOut - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&#039;FreakOut&#039; Malware Analysis - Groups Behind FreakOut - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Produced by: NSFOCUS Security Labs In early January 2021, NSFOCUS Security Labs captured an unknown malicious program called &quot;out.py&quot; via its real-time\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-15T10:27:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"&#039;FreakOut&#039; Malware Analysis - Groups Behind FreakOut - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Produced by: NSFOCUS Security Labs In early January 2021, NSFOCUS Security Labs captured an unknown malicious program called &quot;out.py&quot; via its real-time\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"&#8216;FreakOut&#8217; Malware Analysis &#8211; Groups Behind FreakOut\",\"datePublished\":\"2021-03-15T10:27:50+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/\"},\"wordCount\":1142,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/11.jpg\",\"keywords\":[\"malware\"],\"articleSection\":[\"Blog\",\"DDoS Mitigation\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/\",\"name\":\"'FreakOut' Malware Analysis - Groups Behind FreakOut - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/11.jpg\",\"datePublished\":\"2021-03-15T10:27:50+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/11.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/11.jpg\",\"width\":1200,\"height\":487,\"caption\":\"malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-analysis-report-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8216;FreakOut&#8217; Malware Analysis &#8211; Groups Behind FreakOut\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"'FreakOut' Malware Analysis - Groups Behind FreakOut - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/","og_locale":"pt_BR","og_type":"article","og_title":"'FreakOut' Malware Analysis - Groups Behind FreakOut - NSFOCUS","og_description":"Produced by: NSFOCUS Security Labs In early January 2021, NSFOCUS Security Labs captured an unknown malicious program called \"out.py\" via its real-time","og_url":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/","og_site_name":"NSFOCUS","article_published_time":"2021-03-15T10:27:50+00:00","article_modified_time":"2026-04-17T18:07:46+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"'FreakOut' Malware Analysis - Groups Behind FreakOut - NSFOCUS","twitter_description":"Produced by: NSFOCUS Security Labs In early January 2021, NSFOCUS Security Labs captured an unknown malicious program called \"out.py\" via its real-time","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"&#8216;FreakOut&#8217; Malware Analysis &#8211; Groups Behind FreakOut","datePublished":"2021-03-15T10:27:50+00:00","dateModified":"2026-04-17T18:07:46+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/"},"wordCount":1142,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","keywords":["malware"],"articleSection":["Blog","DDoS Mitigation"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/","url":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/","name":"'FreakOut' Malware Analysis - Groups Behind FreakOut - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","datePublished":"2021-03-15T10:27:50+00:00","dateModified":"2026-04-17T18:07:46+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","width":1200,"height":487,"caption":"malware"},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/freakout-analysis-report-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"&#8216;FreakOut&#8217; Malware Analysis &#8211; Groups Behind FreakOut"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=12686"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12686\/revisions"}],"predecessor-version":[{"id":32682,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12686\/revisions\/32682"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/12722"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=12686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=12686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=12686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}