Figure1

Figure1

Figure 1 – The disguise used by the malware at the time of writing