PK UB meta.xml "510212#F3F4F9PKg PK UB content.xmlsheet1Malware Analysis ReportThis Malware Analysis Report template was created by Lenny Zeltser.Lenny teaches a Reverse-Engineering Malware (REM) course at SANS Institute.For details, see http://www.LearnREM.com.For recommendations what to include in the malware analysis report, seehttp://zeltser.com/reverse-malware/malware-analysis-report.htmlSummary of the analysisKey observationsRecommendationsLimitationsReport date and authorsSample's IdentificationFile name, type, sizeFile hashesAnti-virus identifiersSample's CharacteristicsInfection capabilitiesSelf-preservation capacitySpreading mechanicsData leakage abilitiesRemote attacker interactionsDependenciesSupported OSRequired librariesConfiguration filesScripts and executablesURLsObservationsBehavioral analysisStatic code analysisDynamic code analysisMemory analysisSupporting FiguresLogsStringsFunction listingsScreenshotsPKK PK UB
styles.xml
PK@{ PK UB Thumbnails/thumbnail.png PNG
IHDR F [G2 bIDATx xUsy*Tu|]pDYuQETtFqg$(
N$!B6 C:H7FN.=PNM]Un:>uYsꜪN-=N lq[ fI a i 6$
04 `@ lH
I a i 6$
04 `@ lH
I a i 6$
a: >(4 `j]|q'O>}s=~d0O]WúҦv (4k֮KIhm묨
XtțaAISS8eʔ_#G &%Z[ Ic]L48@-qVΜ5kΜ}=~oKM6gx8٫y꩕sڎ^&)q֬;.n7Fn/oe Ic]O?LTt|{."i.[~Xtx:EtR5l{<33ЃT*%5|5jtwx%]wiPw HƺhoٳǝtO~\{^TҨ☸Jf:kֲFsb1^JJNcy+V<[OxB8d $LM$ɱuzQIijc$N6Z4aʔ)ܧn&x%͝we|殻 Hƪ).W_89Saǹ&*:VY+.r
gÆIlj^I0~7
e Ic],Yǿ~vy3gS}1Y!IP}x:KzFOy͘CT*6.3KCJI߷ϓm2J^z嬬cEha. H낄o&\4_\RA̙gų3g!ozwsK&k36O!:&Ȅ -ZbҩZ|lf }(/^n/5kѦ. HFHE2 p|mH 0Ɓk@ 1_
I a i 6$
mwAtINI~( @ O9,,G7(= @. im~Dv3 \@ ۦYt 4
:88n H`l۶Mv \@ `,I3F7&[ 4 `r86/!%P7 V(iФxx?{ݺʪ3dlDt+ fDn^iv|kڲs-Slӛ~]MpDt+ fXG"#C_/pڲs-prEeSo022橧VqVvt2>8k֝J7Mgxf4!dA9k֜9s͛ߙ7ʹ}lܚ:vz;IRF fK\S'$n?橬:3m4֩`{/^mm:-kA鬦CXׅ"&Mnj>Ƕij2e
n4oydko*)1I3<[T\+V