The document provides a detailed technical analysis of the Duqu 2.0 malware. It describes how the malware initially infects systems through spear-phishing emails containing exploits. It then uses lateral movement techniques like pass-the-hash and Windows Installer packages to spread within networks. The packages contain encrypted payloads that load additional modules when decrypted to perform functions like information harvesting. Analysis found the malware targeting systems related to nuclear negotiations with Iran and the liberation of Auschwitz.