Introduction Malware group History Analysis of BloodAlchemy Initial infection vector and infection flow Analysis of malicious DLL Analysis of shellcode Analysis of payload (BloodAlchemy) Structures Functions Creation of VFT associated with each communication protocol Backdoor commands The code simil…