Include MD5, SHA-1, and SHA-256 hashes to uniquely identify the sample. You can verify these against databases like VirusTotal .
Describe the behavior observed when the sample is run in a secure, isolated sandbox environment. N4Tx83qgxATKkUXuPLaw.zip
Specific IP addresses or domains the malware contacts. Include MD5, SHA-1, and SHA-256 hashes to uniquely
(e.g., Trojan, Ransomware, or Spyware) Risk Level: High/Critical or Spyware) Risk Level: High/Critical