I recently received some interesting malware attached to a phishing Email.
This is always a great opportunity to do some basic (triage) malware analysis in order to get a general idea of the malware’s intent, capabilities, and how well our defenses are currently aligned with actual real-world threats.
This time I decided to record the analysis in case someone else might find it useful.
Enjoy!
