National Vulnerability Database Information: Common Vulnerability and Exposure Listing, Common Attack Pattern Exploited, Aliases, Variants

The paper must be in APA Format at least 10 pages not including the cover page, abstract, outline, and references. The paper will be graded technical content and APA Format. A Kill Chain Analysis is required.
Organize your paper and address as many of the following items as possible:
1. Background Regarding the Malware
a. General Description: When, where and how was the malware discovered
b. Category of Malware: Virus, Worm, Trojan, etc.
2. Technical Detail Regarding the Malware
a. National Vulnerability Database Information: Common Vulnerability and Exposure Listing, Common Attack Pattern Exploited, Aliases, Variants, etc.
b. Technical Information: Vulnerabilities Exploited, Infection Mechanism, Applications, Operating Systems, Hardware Affected, Unique characteristics, etc.
c. Payload Information: Trojan, Rootkit, Backdoor, Keylogger, etc.
d. Propagation Mechanisms: Worm, Email, Botnet, Social Media, Supply Chain, etc.
e. Obfuscation Techniques: Compression, encryption, polymorphism, anti-debugging, anti-disassembly
f. General and specific detection techniques
g. Remediation actions/procedures
3. Impacts of the Malware
a. Describe the Political, Social and Economic effects
b. Target of the attacks: Government, Users and Industry.
c. Magnitude of attacks: Global, Nation State, Local
d. Costs: Remediation, economic losses, etc.
e. Action Taken: Political/Government, Legal proceedings, Charges, Prosecution

4. Malware Cybersecurity Attack Lifecycle Analysis and Mitigation Techniques
a. Reconnaissance: Detect Potential Attack
b. Weaponization: Deny Attacker Information
c. Delivery: Disrupt Attackers Attempts
d. Exploit: Degrade Effectiveness or Deflect Attack
e. Control: Deceive Attacker
f. Execute: Destroy Attackers Capability to Execute
g. Maintain: Recover from Attack

Latest Assignments