This Report is going to be in two phases;
It is important to note that for Static Analysis, we DO NOT EXECUTE the Malware Binary
This is done to understanding the features /characteristics of what the malware could be doing
Steps
Pull the SHA256 hash for this particular malware sample - using Cmder
Pull the MD5 hash
Desktop\\PMAT-labs-main\\labs\\1-3.Challenge-SillyPutty file pathλ sha256sum.exe putty.exe
# OUTPUT
# 0c82e654c09c8fd9fdf4899718efa37670974c9eec5a8fc18a167f93cea6ee83 *putty.exe - SHA256 HASH
λ md5sum.exe putty.exe
# 334a10500feb0f3444bf2e86ab2e76da *putty.exe - MD5 HASH
Check the malware and if its been known/has any digital signatures in the real world - using VirusTotal

We notice few things from initial investigation in the Detection Pane.
We see the Malware Binary name - PuTTY
The category of said Malware Binary - Trojan
Flagged by 86% of Security Vendors as malicious
Details Pane

Graph Summary to show Relations

Strings & FLOSS
Strings: An array of characters
Floss pulls the strings out of the binary and decodes/de-obfuscates any strings it finds
floss.exe putty.exe > floss.txt
#to make it easier to analyze the floss strings
