Report - Storm Worm & Botnet Analysis€¦ · The worm uses a custom packer and encryption to protect its binary file, so the first step it takes is to unpack and decrypt the embedded PE file.

Please pass captcha verification before submit form