What is the name of the module used to serve the malicious payload?
Analyzing the traffic, what is the attacker's IP address?
Now that you know the payload name and the module used to deliver the malicious files, what is the URL that was embedded in the malicious email?
Find the PowerShell launcher string (you don’t need to include the base64 encoded script).
What is the default user agent being used for communications?
You are seeing a lot of HTTP traffic. What is the name of a process where malware communicates with a central server asking for instructions at set time intervals?
What is the URI containing 'login' that the victim machine is communicating to?
What is the name of the popular post-exploitation framework used for command-and-control communication?