Describe what happens when the file is executed in a controlled "sandbox" environment.
Provide a clean list of data points that security tools can use to block this threat: Any malicious URLs or IP addresses. Download File Bambei.zip
List any domains, IP addresses, or C2 (Command and Control) servers the file attempts to contact. Describe what happens when the file is executed