When it comes to understanding attacker tradecraft few, if any, methods of research can yield better results than the reverse engineering of malware.
How they get the malicious content to the target, execute the payload, and achieve their objectives is hardcoded into the very scripts and programs they use.
In this article, I reverse engineer a modern malware installer, detail how malware has evolved, and discuss ways to defend against it.