: Identify any C2 (Command and Control) IP addresses or domains it attempts to contact.

If you are analyzing the file yourself, cite the use of these standard malware analysis tools : : To generate unique file identifiers.

: To capture and analyze the network traffic generated upon execution.

To make the paper "solid," follow a professional malware analysis framework: