{"id":6347,"date":"2018-11-26T03:31:30","date_gmt":"2018-11-26T03:31:30","guid":{"rendered":"http:\/\/blog.nsfocusglobal.com\/?p=1920"},"modified":"2018-11-26T03:31:30","modified_gmt":"2018-11-26T03:31:30","slug":"sample-analysis-report-3","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/sample-analysis-report-3\/","title":{"rendered":"Sample Analysis Report-3"},"content":{"rendered":"<h1><a name=\"_Toc530406123\"><\/a><a name=\"_Toc530402073\"><\/a>1 Sample Introduction<\/h1>\n<h2><a name=\"_Toc530406124\"><\/a><a name=\"_Toc530402074\"><\/a>1.1 Sample Type<\/h2>\n<p>The sample is a Trojan, which belongs to the Tsunami family.<!--more--><\/p>\n<h2><a name=\"_Toc530406125\"><\/a>1.2 Background<\/h2>\n<p>None.<\/p>\n<h2><a name=\"_Toc530406126\"><\/a><a name=\"_Toc530402075\"><\/a>1.3 Target<\/h2>\n<p><a name=\"_Toc527615482\"><\/a>The sample can affect 64-bit Linux platforms (its cross-compiled versions are likely to affect other platforms).<\/p>\n<h2><a name=\"_Toc530406127\"><\/a><a name=\"_Toc530402076\"><\/a>1.4 Attack Method<\/h2>\n<p>The sample executes commands issued by the remote control end in real time to launch DDoS attacks by exploiting user hosts for a period of time.<\/p>\n<h1><a name=\"_Toc530406128\"><\/a><a name=\"_Toc530402077\"><\/a>2 Propagation and Infection<\/h1>\n<p><a name=\"_Toc334431339\"><\/a>This sample can spread by exploiting vulnerabilities such the weak passwords in the server.<\/p>\n<p>Tsunami is a long-standing family and has various spreading methods.<\/p>\n<h1><a name=\"_Toc530406129\"><\/a><a name=\"_Toc530402078\"><\/a>3 In-depth Analysis<\/h1>\n<h2><a name=\"_Toc530406130\"><\/a><a name=\"_Toc530402079\"><\/a>3.1 File Format<\/h2>\n<p>i64 (ida pro 6.8 and later)<\/p>\n<h2><a name=\"_Toc456275705\"><\/a><a name=\"_Toc530406131\"><\/a>3.2 Major Functions<\/h2>\n<p><a name=\"_Toc530402081\"><\/a>[1] <strong>Process behavior<\/strong>: The sample enables child processes to receive commands from the remote control end and launch attacks.<\/p>\n<p>[2] <strong>Network behavior<\/strong>: The sample receives IRC commands from the remote control end and launch DDoS attacks.<\/p>\n<h2><a name=\"_Toc530406132\"><\/a>3.3 Launch Mode<\/h2>\n<p>The sample can automatically starts up by writing itself into \/etc\/rc.d\/rc.local or \/etc\/rc.conf.<\/p>\n<h2><a name=\"_Toc530406133\"><\/a>3.4 Anti-analysis techniques<\/h2>\n<ol>\n<li>The sample is packed with the UPX technology.<\/li>\n<li>It calculates the running time of code at certain locations to detect dynamic debugging.<\/li>\n<li>It uses \/usr\/sbin\/sshd to replace the first parameter in the main function (which is supposed to be the execution path) to spoof the ps command.<\/li>\n<\/ol>\n<p>Before replacement:<\/p>\n<p id=\"NyEXONo\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1921 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb681289af1.png\" alt=\"\" \/><\/p>\n<p>After replacement:<\/p>\n<p id=\"hlRCWUm\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1922 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb682217196.png\" alt=\"\" \/><\/p>\n<h2><a name=\"_Toc527615490\"><\/a><a name=\"_Toc527615491\"><\/a><a name=\"_Toc530406134\"><\/a>3.5 Detailed Analysis<\/h2>\n<h3><a name=\"_Toc530406135\"><\/a>3.5.1 Connecting to the C2 Server<\/h3>\n<p>The sample randomly generates an IRC nickname which is in the format of &lt;[Tsuyoi]&gt;&lt;random string&gt;.<\/p>\n<p>According to the current time, current process ID, and parent process, the sample picks random content from the user dictionary usr\/dict\/words. The random string is shorter than 9 bytes.<\/p>\n<p>Then the sample uses TCP to connect to 104.248.231.177:6667 and then sends packets. The packet format is as follows:<\/p>\n<p id=\"AYPZyfc\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1923 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb6843b848e.png\" alt=\"\" \/><\/p>\n<p id=\"TOhShUS\"><img fetchpriority=\"high\" decoding=\"async\" width=\"531\" height=\"112\" class=\"alignnone size-full wp-image-1924 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb68498531e.png\" alt=\"\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb68498531e.png 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb68498531e-300x63.png 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/p>\n<p id=\"HDMxVre\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1925 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb68535548a.png\" alt=\"\" \/><\/p>\n<h3><a name=\"_Toc527615492\"><\/a><a name=\"_Toc530406136\"><\/a>3.5.2 C2 Command<\/h3>\n<p>The command in the IRC format is: &lt;prefix&gt;&lt;command&gt;&lt;parameter1&gt;&lt;parameter2&gt;\u2026<\/p>\n<p>The format of the prefix is: &lt;colon&gt;&lt;#C2 nickname&gt;. Normally, the C2 nickname is saved for the display of errors. If the received command is found not to contain the nickname in the prefix, the nickname will be displayed as an asterisk (*).<\/p>\n<p>If the format of the command sent by the remote control end is incorrect, the sample will send the correct command format as a reminder, with the C2 nickname shown in the prefix format.<\/p>\n<p>The C2 function is saved as a form in the format of &lt;command category name \u2013 functional function&gt;.<\/p>\n<p id=\"xemZPyS\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1926 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb685f51e09.png\" alt=\"\" \/><\/p>\n<p>Privmsg falls into four types of subcommands.<\/p>\n<p id=\"HdqWGSu\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1927 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb6864ee8e4.png\" alt=\"\" \/><\/p>\n<p id=\"ebzrwrr\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1928 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb687012e9e.png\" alt=\"\" \/><\/p>\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The following table lists all commands.<\/p>\n<table width=\"529\">\n<thead>\n<tr>\n<td width=\"151\">Command Category<\/td>\n<td width=\"161\">Subcommand<\/td>\n<td width=\"269\">Function<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"151\">352<\/td>\n<td width=\"161\">None<\/td>\n<td width=\"269\">Saves IP information sent by the remote control end.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">376<\/td>\n<td width=\"161\">None<\/td>\n<td width=\"269\">Echoes <strong>Mode<\/strong>, <strong>JOIN<\/strong>, and <strong>WHO<\/strong> information, indicating which Internet Relay Chat (IRC) channel to join.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">433<\/td>\n<td width=\"161\">None<\/td>\n<td width=\"269\">Changes the current nickname.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">422<\/td>\n<td colspan=\"2\" width=\"430\">Same as 376<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"151\">Privmsg<\/td>\n<td width=\"161\">+std<\/td>\n<td width=\"269\">UDP flood DDOS<\/td>\n<\/tr>\n<tr>\n<td width=\"161\">+stop<\/td>\n<td width=\"269\">Kills its own child processes.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\">+unknown<\/td>\n<td width=\"269\">Launches a UDP flood DDoS attack against a random port.<\/td>\n<\/tr>\n<tr>\n<td width=\"161\">Kkt9x4JApM0RuSqCLA<\/td>\n<td width=\"269\">Kills processes in the same group.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\">Ping<\/td>\n<td width=\"161\">None<\/td>\n<td width=\"269\">Echoes PONG for heartbeat.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><a name=\"_Toc527615493\"><\/a><a name=\"_Toc530406137\"><\/a>3.5.3 352, 376, 433, and 422<\/h3>\n<p>The complete format of command 352 is as follows:<\/p>\n<p>:#C2 nickname 352 p1 p2 p3 p4_ip p5 p6_nickname<\/p>\n<p><a name=\"_Toc527615494\"><\/a>Currently, we have no knowledge about all parameter meanings. However, there must be six parameters. If the sixth parameter is confirmed to be the nickname of the zombie computer, the fourth parameter will be saved. The fourth parameter is an IPv4 address, which is not handled by the sample. This is possibly because that the sample has not been fully developed yet.<\/p>\n<p>Commands 376 and 433 do not have parameters, and parameters 422 and 376 have the same function.<\/p>\n<h3><a name=\"_Toc530406138\"><\/a>3.5.4 PRIVMSG<\/h3>\n<p>This command is used to launch UDP flood DDoS attacks. Its standard format is as follows:<\/p>\n<p>:#C2 nickname PRIVMSG\u00a0 #Tsuyoi :&gt;wildcard string +std parameter 1 parameter 2 \u2026\u2026<\/p>\n<p>The wildcard string is used to match against the zombie nickname. Characters B, O, T, b, o, and t indicate that match against one or more characters, which is equivalent to an asterisk (*). The character ? is used to match against one character.<\/p>\n<p>The complete formats of subcommands are as follows:<\/p>\n<ul>\n<li>+std<\/li>\n<\/ul>\n<p>:#C2 nickname PRIVMSG #Tsuyoi :&gt; wildcard string +std &lt;target IP&gt; &lt;port&gt; &lt;attack duration (in seconds)&gt;<\/p>\n<p>This command launches a UDP flood DDoS attack against the target and shows the start information before the attack and completion information after the attack.<\/p>\n<p id=\"MfhIsER\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1929 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb687e1fa27.png\" alt=\"\" \/><\/p>\n<p id=\"bLtoOAx\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1930 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb6884ba3e1.png\" alt=\"\" \/><\/p>\n<ul>\n<li>+stop<\/li>\n<\/ul>\n<p>:#C2 nickname PRIVMSG #Tsuyoi :&gt; wildcard string + stop<\/p>\n<p>This command kills ongoing child processes. These child processes are those enabled by commands +std and +unknown for launching DDoS attacks.<\/p>\n<ul>\n<li>+unknown<\/li>\n<\/ul>\n<p>&lt;:#C2 nickname PRIVMSG #Tsuyoi :&gt; wildcard string +unknown &lt;target IP&gt; &lt;attack duration&gt;<\/p>\n<p>This command launches a UDP flood DDoS attack against a random port of the target and echoes the start information before the attack and complete information after the attack.<\/p>\n<p id=\"JzkHVlu\"><img decoding=\"async\" width=\"531\" height=\"188\" class=\"alignnone size-full wp-image-1931 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb688b7af38.png\" alt=\"\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb688b7af38.png 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb688b7af38-300x106.png 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/p>\n<p id=\"wbYwJgj\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1932 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb6893cb2c4.png\" alt=\"\" \/><\/p>\n<ul>\n<li>Kkt9x4JApM0RuSqCLA<\/li>\n<\/ul>\n<p><a name=\"_Toc527615495\"><\/a>:#C2 nickname PRIVMSG #Tsuyoi :&gt;wildcard string Kkt9x4JApM0RuSqCLA<\/p>\n<p>If &lt;#C2 nickname&gt; is displayed as &#8220;Fine&#8221;, the sample kills all processes in its group. Otherwise, it returns related information to the remote control end.<\/p>\n<h3><a name=\"_Toc530406139\"><\/a>3.5.5 Ping<\/h3>\n<p>The format of the command is: &lt;:C2 nickname&gt; Ping.<\/p>\n<p>This command directs the zombie to return &#8220;PONG Ping&#8221; to the remote control end as a response to the <strong>ping<\/strong> command.<\/p>\n<h1><a name=\"_Toc530406140\"><\/a>4 Attack Location<\/h1>\n<p>The sever used by the sample to obtain the C2 address is 104.248.231.177, located in the USA.<\/p>\n<h1><a name=\"_Toc530406141\"><\/a>5 IoC Output<\/h1>\n<h1><a name=\"_Toc530406142\"><\/a>6 Hardcoded IP and Domain Name<\/h1>\n<p>104.248.231.177<\/p>\n<h1><a name=\"_Toc530406143\"><\/a>7 Signature for Detection\/Detection Script (Optional)<\/h1>\n<p id=\"dYiMxoi\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1933 \" src=\"https:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/img_5bfb68c9293c8.png\" alt=\"\" \/><\/p>\n<h1><a name=\"_Toc530406144\"><\/a>8 References<\/h1>\n<ul>\n<li>hxxps:\/\/www.alien.net.au\/irc\/irc2numerics.html<\/li>\n<li>hxxps:\/\/tools.ietf.org\/html\/rfc1459#page-37<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>1 Sample Introduction 1.1 Sample Type The sample is a Trojan, which belongs to the Tsunami family.<\/p>\n","protected":false},"author":1,"featured_media":30783,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[17,20],"tags":[592,629],"class_list":["post-6347","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vulnerability-analysis","category-uncategorized","tag-propagation-and-infection","tag-sample-analysis-report"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sample Analysis Report-3 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sample Analysis Report-3 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"1 Sample Introduction 1.1 Sample Type The sample is a Trojan, which belongs to the Tsunami family. 1.2 Background None. 1.3 Target The sample can affect\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-26T03:31:30+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Sample Analysis Report-3 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"1 Sample Introduction 1.1 Sample Type The sample is a Trojan, which belongs to the Tsunami family. 1.2 Background None. 1.3 Target The sample can affect\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Sample Analysis Report-3\",\"datePublished\":\"2018-11-26T03:31:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/\"},\"wordCount\":914,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Propagation and Infection\",\"Sample Analysis Report\"],\"articleSection\":[\"Threat Analysis\",\"Uncategorized\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/\",\"name\":\"Sample Analysis Report-3 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2018-11-26T03:31:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/sample-analysis-report-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sample Analysis Report-3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sample Analysis Report-3 - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Sample Analysis Report-3 - NSFOCUS","og_description":"1 Sample Introduction 1.1 Sample Type The sample is a Trojan, which belongs to the Tsunami family. 1.2 Background None. 1.3 Target The sample can affect","og_url":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/","og_site_name":"NSFOCUS","article_published_time":"2018-11-26T03:31:30+00:00","author":"admin","twitter_card":"summary_large_image","twitter_title":"Sample Analysis Report-3 - NSFOCUS","twitter_description":"1 Sample Introduction 1.1 Sample Type The sample is a Trojan, which belongs to the Tsunami family. 1.2 Background None. 1.3 Target The sample can affect","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Sample Analysis Report-3","datePublished":"2018-11-26T03:31:30+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/"},"wordCount":914,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/#primaryimage"},"thumbnailUrl":"","keywords":["Propagation and Infection","Sample Analysis Report"],"articleSection":["Threat Analysis","Uncategorized"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/","url":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/","name":"Sample Analysis Report-3 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/#primaryimage"},"thumbnailUrl":"","datePublished":"2018-11-26T03:31:30+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/sample-analysis-report-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Sample Analysis Report-3"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/6347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=6347"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/6347\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=6347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=6347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=6347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}