{"id":12727,"date":"2021-03-16T09:09:58","date_gmt":"2021-03-16T09:09:58","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=12727"},"modified":"2026-04-17T18:07:46","modified_gmt":"2026-04-17T18:07:46","slug":"freakout-malware-analysis-freakout-samples","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/freakout-malware-analysis-freakout-samples\/","title":{"rendered":"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><strong>Produced by: NSFOCUS Security Labs<\/strong><\/p>\n\n\n\n<p>FreakOut samples appearing in the campaign were a typical IRC bot Trojan program written in Python. The Trojan program would connect to IRC channels in hardcoded C&amp;C and act as instructed by C&amp;C to collect information, launch DDoS attacks, interact with shells, and conduct ARP sniffing attacks. Also, it carried three vulnerability payloads and could attack vulnerable web servers for lateral movement.<\/p>\n\n\n\n<p>Code in the following screenshots was deobfuscated to facilitate understanding.<\/p>\n\n\n\n<p><strong>Persistence and Antagonism<\/strong> <\/p>\n\n\n\n<p>The FreakOut Trojan mainly achieved persistence via the following operations:<\/p>\n\n\n\n<p>1. Use the fork function to generate a daemon:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"799\" height=\"228\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/16.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12728\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/16.jpg 799w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/16-300x86.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/16-768x219.jpg 768w\" sizes=\"(max-width: 799px) 100vw, 799px\" \/><\/figure>\n\n\n\n<p>2. Change its name to boot.py and write itself to rc.local for automatic start at system startup:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"791\" height=\"282\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/17.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12729\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/17.jpg 791w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/17-300x107.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/17-768x274.jpg 768w\" sizes=\"(max-width: 791px) 100vw, 791px\" \/><\/figure>\n\n\n\n<p>The FreakOut Trojan usually engages in the following antagonistic activities:<\/p>\n\n\n\n<p>1. Protect critical information via XOR encryption or zlib compression:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"425\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/18-1024x425.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12730\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/18-1024x425.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/18-300x124.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/18-768x319.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/18-1536x637.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/18.jpg 1632w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The XOR encryption corresponds to the following decryption algorithm:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"586\" height=\"44\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/19.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12731\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/19.jpg 586w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/19-300x23.jpg 300w\" sizes=\"(max-width: 586px) 100vw, 586px\" \/><\/figure>\n\n\n\n<p>2. Interfere with analysis to some degree via variant and method name confusion:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"910\" height=\"102\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/20.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12732\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/20.jpg 910w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/20-300x34.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/20-768x86.jpg 768w\" sizes=\"(max-width: 910px) 100vw, 910px\" \/><\/figure>\n\n\n\n<p>3. Run single instance of an application and command line detection: The sample ran single instance of an application by using an abstract UNIX domain socket and binding a special keyword postconnect_gateway_notify_lock.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1023\" height=\"310\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/21.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12733\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/21.jpg 1023w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/21-300x91.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/21-768x233.jpg 768w\" sizes=\"(max-width: 1023px) 100vw, 1023px\" \/><\/figure>\n\n\n\n<p><strong>Vulnerability Spread<\/strong><\/p>\n\n\n\n<p>The FreakOut trojan exploited three vulnerabilities assigned CVE-2020-28188, CVE-2021-3007, and CVE-2020-7961 for lateral movement via TerraMaster TOS, Zend Framework, and Liferay Portal respectively. It is worth noting that CVE-2021-3007 was a deserialization vulnerability discovered in January 2021, which was close to the time when the FreakOut Trojan appeared in the wild.<\/p>\n\n\n\n<p>&#8211; CVE-2020-28188<\/p>\n\n\n\n<p>The vulnerability is due to lack of input validation in the &#8220;event&#8221; parameter on the &#8220;makecvs&#8221; PHP page (\/include\/makecvs.php). This allows unauthenticated, remote attackers to inject OS commands and use TerraMaster TOS before 4.2.06 to take control of servers.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"136\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/22-1024x136.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12734\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/22-1024x136.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/22-300x40.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/22-768x102.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/22.jpg 1248w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"94\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/23-1024x94.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12735\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/23-1024x94.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/23-300x27.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/23-768x70.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/23.jpg 1279w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p> &#8211; CVE-2021-3007<\/p>\n\n\n\n<p>The vulnerability is triggered by insecure object deserialization. In Zend Framework later than 3.0.0, attackers abuse the Zend3 feature that loads classes from objects so as to upload and execute malicious code on servers. The code can be uploaded using the &acirc;&euro;&oelig;callback&acirc;&euro; parameter, which in this case inserts malicious code rather than the callbackOptions array.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"284\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/24-1024x284.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12736\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/24-1024x284.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/24-300x83.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/24-768x213.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/24.jpg 1247w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"126\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/25-1024x126.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12738\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/25-1024x126.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/25-300x37.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/25-768x94.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/25.jpg 1268w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>&#8211; CVE-2020-7961<\/p>\n\n\n\n<p>The vulnerability is a Java unmarshalling vulnerability via JSON web services (JSONWS) in Liferay Portal prior to 7.2.1 CE GA2. Marshalling, which is similar to serialization, is used for communication with remote objects, in our case with a serialized object. Exploiting the vulnerability lets the attacker provide a malicious object, that when unmarshalled, allows remote code execution.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"985\" height=\"298\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/26.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12739\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/26.jpg 985w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/26-300x91.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/26-768x232.jpg 768w\" sizes=\"(max-width: 985px) 100vw, 985px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"84\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/27-1024x84.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12737\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/27-1024x84.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/27-300x25.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/27-768x63.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/27-1536x126.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/27.jpg 1578w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>After deserialization, the vulnerability payload would access http:\/\/gxbrowser.net:8004\/t and download the <strong>t<\/strong> java file. As shown in the following figure, after successful exploitation, out.py would be obtained and executed with a changed name.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/28.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12740\" width=\"551\" height=\"660\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/28.jpg 735w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/28-251x300.jpg 251w\" sizes=\"(max-width: 551px) 100vw, 551px\" \/><\/figure>\n\n\n\n<p><strong>ARP Sniffing and Poisoning<\/strong><\/p>\n\n\n\n<p>FreakOut performed the ARP sniffing function by acting as a man in the middle, excluding some source and destination ports (1337\/6667\/23\/443\/37215\/53\/22), and forwarding received information to the server&#8217;s port 1337. Details are as follows:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"360\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/29-1024x360.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12748\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/29-1024x360.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/29-300x105.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/29-768x270.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/29-1536x540.jpg 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/29.jpg 1716w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"666\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/30-1024x666.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12741\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/30-1024x666.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/30-300x195.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/30-768x500.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/30.jpg 1239w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Communications<\/strong><\/p>\n\n\n\n<p>The Trojan used the IRC protocol for C&amp;C communication. The online information is illustrated as follows:<\/p>\n\n\n\n<p>Sample: NICK [HAX|Linux|x86_64|32]aYXzMIcqFqg<\/p>\n\n\n\n<p>Description: [HAX|operating system|architecture|CPU quantity]8&acirc;&euro;&ldquo;12 random letters<\/p>\n\n\n\n<p>Sample: USER [HAX|Linux|x86_64|32]aYXzMIcqFqg gxbrowser.net localhost: aYXzMIcqFqg<\/p>\n\n\n\n<p>Description: The command adds a server address and hardcoded field &#8220;localhost: &#8220;<\/p>\n\n\n\n<p class=\"has-background has-very-light-gray-background-color\">USER &lt;username&gt;&lt;hostname&gt;&lt;servername&gt;&lt;realname&gt;(<a href=\"https:\/\/tools.ietf.org\/html\/rfc1459\">RFC 1459<\/a>)<\/p>\n\n\n\n<p>Sample: JOIN #update N3Wm3W<\/p>\n\n\n\n<p>Description: Hardcoded channel and chatroom password<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1022\" height=\"245\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/31.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12742\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/31.jpg 1022w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/31-300x72.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/31-768x184.jpg 768w\" sizes=\"(max-width: 1022px) 100vw, 1022px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"754\" height=\"138\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/32.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12743\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/32.jpg 754w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/32-300x55.jpg 300w\" sizes=\"(max-width: 754px) 100vw, 754px\" \/><\/figure>\n\n\n\n<p><strong>Instructions and Functions<\/strong> <\/p>\n\n\n\n<p>Under the control of C&amp;C, the FreakOut Trojan could collect information, launch DDoS attacks, interact with shells, perform ARP sniffing, and conduct other attacks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/33-936x1024.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12744\" width=\"468\" height=\"512\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/33-936x1024.png 936w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/33-274x300.png 274w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/33-768x841.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/33.png 974w\" sizes=\"(max-width: 468px) 100vw, 468px\" \/><\/figure>\n\n\n\n<p><strong>Version Iteration<\/strong><\/p>\n\n\n\n<p>From the end of 2020 to the beginning of 2021, at least three in-the-wild versions of FreakOut were updated.<\/p>\n\n\n\n<p>The first version necro.py was similar to out.py in the framework and had readable code. It was the predecessor of out.py.<\/p>\n\n\n\n<p>The second version out.py was analyzed in the previous sections. It greatly increased code obfuscation on the basis of necro and added TCP flood and exploit.<\/p>\n\n\n\n<p>The third version benchmark.py added DGA domain name settings based on out, making xyz a top-level domain name of all generated C&amp;C.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"885\" height=\"138\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/34.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12745\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/34.jpg 885w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/34-300x47.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/34-768x120.jpg 768w\" sizes=\"(max-width: 885px) 100vw, 885px\" \/><\/figure>\n\n\n\n<p><strong>FreakOut IoC<\/strong> <\/p>\n\n\n\n<p>Sha256:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/35.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12746\" width=\"476\" height=\"325\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/35.png 952w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/35-300x205.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/35-768x524.png 768w\" sizes=\"(max-width: 476px) 100vw, 476px\" \/><\/figure>\n\n\n\n<p>C&amp;C:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/36.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12747\" width=\"475\" height=\"292\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/36.png 949w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/36-300x184.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/36-768x472.png 768w\" sizes=\"(max-width: 475px) 100vw, 475px\" \/><\/figure>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Produced by: NSFOCUS Security Labs FreakOut samples appearing in the campaign were a typical IRC bot Trojan program written in Python. The Trojan program would connect to IRC channels in hardcoded C&amp;C and act as instructed by C&amp;C to collect information, launch DDoS attacks, interact with shells, and conduct ARP sniffing attacks. Also, it carried [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":12722,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,5],"tags":[506],"class_list":["post-12727","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ddos-mitigation","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Produced by: NSFOCUS Security Labs FreakOut samples appearing in the campaign were a typical IRC bot Trojan program written in Python. The Trojan program\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-16T09:09:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Produced by: NSFOCUS Security Labs FreakOut samples appearing in the campaign were a typical IRC bot Trojan program written in Python. The Trojan program\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples\",\"datePublished\":\"2021-03-16T09:09:58+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/\"},\"wordCount\":707,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/11.jpg\",\"keywords\":[\"malware\"],\"articleSection\":[\"Blog\",\"DDoS Mitigation\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/\",\"name\":\"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/11.jpg\",\"datePublished\":\"2021-03-16T09:09:58+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/11.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/11.jpg\",\"width\":1200,\"height\":487,\"caption\":\"malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/freakout-malware-analysis-freakout-samples\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/","og_locale":"pt_BR","og_type":"article","og_title":"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples - NSFOCUS","og_description":"Produced by: NSFOCUS Security Labs FreakOut samples appearing in the campaign were a typical IRC bot Trojan program written in Python. The Trojan program","og_url":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/","og_site_name":"NSFOCUS","article_published_time":"2021-03-16T09:09:58+00:00","article_modified_time":"2026-04-17T18:07:46+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples - NSFOCUS","twitter_description":"Produced by: NSFOCUS Security Labs FreakOut samples appearing in the campaign were a typical IRC bot Trojan program written in Python. The Trojan program","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples","datePublished":"2021-03-16T09:09:58+00:00","dateModified":"2026-04-17T18:07:46+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/"},"wordCount":707,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","keywords":["malware"],"articleSection":["Blog","DDoS Mitigation"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/","url":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/","name":"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","datePublished":"2021-03-16T09:09:58+00:00","dateModified":"2026-04-17T18:07:46+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/03\/11.jpg","width":1200,"height":487,"caption":"malware"},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/freakout-malware-analysis-freakout-samples\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"\u2018FreakOut\u2019 Malware Analysis \u2013 FreakOut Samples"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=12727"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12727\/revisions"}],"predecessor-version":[{"id":32681,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12727\/revisions\/32681"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/12722"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=12727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=12727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=12727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}