For a comprehensive "paper" or technical deep dive, you should refer to reports from the cybersecurity firms that led the SolarWinds investigation:
: As one of the first to discover the breach, their initial threat research remains a foundational document for understanding this file's context. poolboyinside.rar
: Their analysis of the NOBELIUM toolset explains the handoff between different malware stages (e.g., from SUNBURST to Teardrop/PoolBoy). For a comprehensive "paper" or technical deep dive,