: Identify any Command & Control (C2) IP addresses, domains, or unusual DNS requests.
: Firewall rules to block C2 IPs or EDR (Endpoint Detection and Response) signatures to detect the sample.
Execute the contents in a controlled, isolated sandbox environment (e.g., ANY.RUN or Joe Sandbox ).