Malicious software designed to disrupt operations, steal data, or gain unauthorized access. Malware investigations may involve reverse engineering, log analysis, persistence mechanisms, command-and-control infrastructure, and correlation with known threat actor behaviors.