{"id":23335,"date":"2023-03-13T08:29:11","date_gmt":"2023-03-13T08:29:11","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=23335"},"modified":"2026-04-17T18:07:42","modified_gmt":"2026-04-17T18:07:42","slug":"a-new-botnet-family-discovered-by-nsfocus","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/a-new-botnet-family-discovered-by-nsfocus\/","title":{"rendered":"A New Botnet Family Discovered by NSFOCUS"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\"><strong>Background<\/strong><\/h2>\n\n\n\n<p>Recently NSFOCUS Security Labs detected a batch of suspicious ELF files spreading widely. Further analysis confirmed that these ELF samples belonged to a new botnet family. We named the family &acirc;&euro;&oelig;Peachy Botnet&acirc;&euro; according to the signature information left by the Bot author in the sample.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"385\" height=\"198\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/1.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23336\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/1.png 385w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/1-300x154.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/1-200x103.png 200w\" sizes=\"(max-width: 385px) 100vw, 385px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>The Peachy Botnet began to spread as early as August 2021, and has made many fine-tuning in the code structure. The major changes in the multiple versions are reflected in the modification of attack methods. It supports one DDoS attack only in its early version, and the number rises to 4 in its later version. Both versions appear from August 2021 to the middle of September 2021, and have spread to different degrees later.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Picture2.jpg\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Picture2-1024x290.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23358\" width=\"869\" height=\"245\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Picture2-1024x290.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Picture2-300x85.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Picture2-768x217.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Picture2-600x170.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Picture2-200x57.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Picture2.jpg 1416w\" sizes=\"(max-width: 869px) 100vw, 869px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Sample Analysis<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Transmission<\/strong><\/li><\/ol>\n\n\n\n<p>&nbsp;The Peachy Botnet is spread through Telnet blasting. The affected platforms include arm, spc, ppc, mips and x86 architectures.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/3.png\"><img decoding=\"async\" width=\"1024\" height=\"271\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/3-1024x271.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23340\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/3-1024x271.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/3-300x79.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/3-768x203.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/3-600x159.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/3-200x53.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/3.png 1383w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>The weak password pair used in blasting is typical in the traditional Gafgyt and Mirai botnet families.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"230\" height=\"349\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/4.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23342\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/4.png 230w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/4-198x300.png 198w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/4-200x303.png 200w\" sizes=\"(max-width: 230px) 100vw, 230px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>We noticed that in telnet blasting, the Peachy Botnet would send the string &#8220;PEACH&#8221; which can be used as an excellent signature to mark the family and effectively distinguish it from the telnet scanning traffic of traditional botnet families.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"532\" height=\"77\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/5.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23344\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/5.png 532w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/5-300x43.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/5-200x29.png 200w\" sizes=\"(max-width: 532px) 100vw, 532px\" \/><\/a><\/figure>\n<\/div>\n\n\n<ol class=\"wp-block-list\" type=\"1\" start=\"2\"><li><strong>Communication and instructions<\/strong><\/li><\/ol>\n\n\n\n<p>In establishing a connection with the control server, the Peachy Botnet will splice the command line parameters as the uplink packet, and splice the &#8220;unknown&#8221; string when no parameters are passed in.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"479\" height=\"218\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/6.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23346\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/6.png 479w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/6-300x137.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/6-200x91.png 200w\" sizes=\"(max-width: 479px) 100vw, 479px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>The flow generated is as follows:&nbsp; &nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"680\" height=\"130\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/7.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23348\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/7.png 680w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/7-300x57.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/7-600x115.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/7-200x38.png 200w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>It will check the received return value first. Different functions will be executed according to the return values of the control server. When the return value is 0x104, it will run the download and update functions. &nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/8.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/8.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23350\" width=\"612\" height=\"340\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/8.png 948w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/8-300x167.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/8-768x428.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/8-600x334.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/8-200x111.png 200w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>The other way is to perform scan blasting and launch DDoS attacks according to the value of the first byte, as shown below:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/9.png\"><img loading=\"lazy\" decoding=\"async\" width=\"506\" height=\"212\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/9.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23352\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/9.png 506w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/9-300x126.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/9-200x84.png 200w\" sizes=\"(max-width: 506px) 100vw, 506px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>When the first byte&#8217;s value is 0xF, a DDoS attack is launched. The latest version of the Peachy Botnet supports four common methods of DDoS attacks, including tcp_raw and udpplain.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/10.png\"><img loading=\"lazy\" decoding=\"async\" width=\"533\" height=\"201\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/10.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23354\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/10.png 533w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/10-300x113.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/10-200x75.png 200w\" sizes=\"(max-width: 533px) 100vw, 533px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Since its first discovery, the Peachy Botnet has remained silent and not launched a destructive attack. But recently, it has strengthened its dissemination. The functions of the Peachy Botnet uses are relatively simple, and the file size of each version is only around 60k. However, compared with the Mirai-based and Gafgyt-based variants that appear in large numbers every day, the architecture adopted by the family is relatively new. Its version is constantly updated, and its functions keep improving, so we infer that the Peachy Botnet will remain active for some time.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>IoC<\/strong><\/p>\n\n\n\n<p style=\"font-size:16px\">4309050903bfd9e6079bfc5e9cb21e82ec4c8b13b29c0b8307da9c86aad7d9e0<\/p>\n\n\n\n<p style=\"font-size:16px\">cf015e8a179f72c8f2173e818767ed346ec28f6349b155f07e1f0208dee9b002<\/p>\n\n\n\n<p style=\"font-size:16px\">e87f5b59fab81a2ad003636fbe8347b46d32a9481d180c9f953cf3ea9dd4bbd3<\/p>\n\n\n\n<p style=\"font-size:16px\">c17a1ddc156733a04a1deb651ab5644b6ac75e3bc481e69a13ff3dcc4e0d720d<\/p>\n\n\n\n<p style=\"font-size:16px\">c7e9bc0403253991b8189d848a6d395f1f73ccd2da1af7f00938e230bddc5a76<\/p>\n\n\n\n<p style=\"font-size:16px\">6502092c4b73142f3e06e323add1da8b90adefe2c4545cdb24025097295d2e66<\/p>\n\n\n\n<p style=\"font-size:16px\">0454b55141cbb4c2a7a3dfd27c89e0831fe30c939ed3a630893978ad284a696f<\/p>\n\n\n\n<p style=\"font-size:16px\">323be16b1fc824f1c3fa1a80bf6e81e1997ba2ef61090a3b1aee706230c7a50a<\/p>\n\n\n\n<p style=\"font-size:16px\">90b0703ebbd096b757d5c19175459bfdb0f4003cfc46d306f0bcd251fb649457<\/p>\n\n\n\n<p style=\"font-size:16px\">6b4438ce21e4ebd9af45b48b2986d8ea3f8dc2281aa30470116e00b19b864735<\/p>\n\n\n\n<p style=\"font-size:16px\">3edbfab04f3c67e0a585dce03201196ed821fbbf80b23133fa56ca32b27de57c<\/p>\n\n\n\n<p style=\"font-size:16px\">2c9fab4101794f696d3cdfc259564cc4<\/p>\n\n\n\n<p>778db5ee392be30ef8f0291533e123f6 37.0.11.160<\/p>\n\n\n\n<p style=\"font-size:16px\"><strong>About NSFOCUS Security Labs<\/strong><\/p>\n\n\n\n<p style=\"font-size:16px\">NSFOCUS Security Labs (NSL) is an internationally recognized cybersecurity research and threat response center at the front of vulnerability assessment, threat hunting and mitigation research.<\/p>\n\n\n\n<p><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Background Recently NSFOCUS Security Labs detected a batch of suspicious ELF files spreading widely. Further analysis confirmed that these ELF samples belonged to a new botnet family. We named the family &acirc;&euro;&oelig;Peachy Botnet&acirc;&euro; according to the signature information left by the Bot author in the sample. The Peachy Botnet began to spread as early as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":23360,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[118],"class_list":["post-23335","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-botnet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A New Botnet Family Discovered by NSFOCUS - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A New Botnet Family Discovered by NSFOCUS - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Background Recently NSFOCUS Security Labs detected a batch of suspicious ELF files spreading widely. Further analysis confirmed that these ELF samples\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-13T08:29:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/WXWorkCapture_16786969432561.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"A New Botnet Family Discovered by NSFOCUS - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Background Recently NSFOCUS Security Labs detected a batch of suspicious ELF files spreading widely. Further analysis confirmed that these ELF samples\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/WXWorkCapture_16786969432561.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"A New Botnet Family Discovered by NSFOCUS\",\"datePublished\":\"2023-03-13T08:29:11+00:00\",\"dateModified\":\"2026-04-17T18:07:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/\"},\"wordCount\":653,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/WXWorkCapture_16786969432561.png\",\"keywords\":[\"Botnet\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/\",\"name\":\"A New Botnet Family Discovered by NSFOCUS - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/WXWorkCapture_16786969432561.png\",\"datePublished\":\"2023-03-13T08:29:11+00:00\",\"dateModified\":\"2026-04-17T18:07:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/WXWorkCapture_16786969432561.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/WXWorkCapture_16786969432561.png\",\"width\":523,\"height\":275,\"caption\":\"Peachy Botnet\\\" text on maroon background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/a-new-botnet-family-discovered-by-nsfocus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A New Botnet Family Discovered by NSFOCUS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A New Botnet Family Discovered by NSFOCUS - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"A New Botnet Family Discovered by NSFOCUS - NSFOCUS","og_description":"Background Recently NSFOCUS Security Labs detected a batch of suspicious ELF files spreading widely. Further analysis confirmed that these ELF samples","og_url":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/","og_site_name":"NSFOCUS","article_published_time":"2023-03-13T08:29:11+00:00","article_modified_time":"2026-04-17T18:07:42+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/WXWorkCapture_16786969432561.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"A New Botnet Family Discovered by NSFOCUS - NSFOCUS","twitter_description":"Background Recently NSFOCUS Security Labs detected a batch of suspicious ELF files spreading widely. Further analysis confirmed that these ELF samples","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/WXWorkCapture_16786969432561.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"A New Botnet Family Discovered by NSFOCUS","datePublished":"2023-03-13T08:29:11+00:00","dateModified":"2026-04-17T18:07:42+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/"},"wordCount":653,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/WXWorkCapture_16786969432561.png","keywords":["Botnet"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/","url":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/","name":"A New Botnet Family Discovered by NSFOCUS - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/WXWorkCapture_16786969432561.png","datePublished":"2023-03-13T08:29:11+00:00","dateModified":"2026-04-17T18:07:42+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/WXWorkCapture_16786969432561.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/WXWorkCapture_16786969432561.png","width":523,"height":275,"caption":"Peachy Botnet\" text on maroon background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/a-new-botnet-family-discovered-by-nsfocus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"A New Botnet Family Discovered by NSFOCUS"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/23335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=23335"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/23335\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/23360"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=23335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=23335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=23335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}