Basic Information

Composition Strategy

Installation Strategy

Activation Strategy

Information Stealing

Persistence

Privilege Escalation

C&C

Anti-analysis Techniques

Monetization Methods

Documentation