If you are documenting your analysis of this sample, your write-up should include the following sections: :

: This file is likely a live malware sample . Never download or open it on your primary operating system. Always use a dedicated, isolated lab environment.

Observe network callbacks (C2 traffic) and registry modifications. :

Static and dynamic analysis to understand threat actor behavior or malware capabilities. General Steps for Malware Write-ups

salvatore513 (often active on platforms like Any.Run or MalwareBazaar ). Identifier: 20211230_Jhang.

List Indicators of Compromise (IoCs) found during the process.

Execute the file in a monitored environment using tools like or Wireshark .