This document contains a summary of analysis of 5 malware suspects. Key details are provided on each suspect's files, compile times, command and control infrastructure, and behaviors. The analysis suggests the suspects originate from a French-speaking operator and involve use of Lua scripting. Attribution is difficult due to techniques like using commonly known bot names and hosting infrastructure in different countries.