https://www.fireeye.com/blog/threat-research/2015/04/analysis_of_kriptovo.html
http://labs.lastline.com/dissecting-turla-rootkit-malware-using-dynamic-analysis
https://www.proteansec.com/linux/next-generation-dynamic-analysis-with-panda/
https://github.com/cnbird1999/panda