1. Using your initial behavioral analysis findings as a guide, select 2 features of the malware you would like to perform detailed analysis to ascertain its capabilities.
2. Perform sufficient reverse engineering analysis with any combination of techniques to accurately determine is capabilities.
3. Special attention should be given, if the malware is a dropper. Under such circumstances, a discussion of potential risks of the additional payload or components downloadable is required. You should research on their potential damages on the Internet and include it in the discussion section of your report.
4. You may assume the malware given is a new malware without prior anti-virus signature or knowledge. Your findings and research are essential for your customer (a multinational corporation) to handle the incident appropriately.
5. In addition, you have to have to do research and explain in detail with examples 2 approaches on how malware can prevent itself from being disassembled or to fool or prevent the malware analyst from understanding the actual algorithm or code.