Use a tool like CertUtil (Windows) or sha256sum (Linux) to get the SHA-256 hash.
List any IP addresses, domains, or file paths the sample interacts with.
Describe what the malware does (e.g., Trojan, Ransomware, or simple data backup).
Use a tool like CertUtil (Windows) or sha256sum (Linux) to get the SHA-256 hash.
List any IP addresses, domains, or file paths the sample interacts with.
Describe what the malware does (e.g., Trojan, Ransomware, or simple data backup).