Discuss your findings and investigative steps. You should cover as a min-
imum the following points:
(a) The malware's functionality in detail aiming for complete code cov-
erage (ignoring library functions).
(b) Details on any remote control infrastructure.
(c) Methods to detect/control the malware across the network or on the
(d) Methods to remove the malware safely.
(e) The origins of the malware and any information you can find on the