Analysis of the malware of Red October - Part 1