If your interest is actually in the technology behind the legitimate remaster (which malicious files often claim to contain), these resources offer a technical "paper-style" deep dive:
: This report highlights the surge in "Generic Malware," "Trojans," and "Infostealers" (making up nearly 30% of telemetry) which are frequently spread via masqueraded software downloads.
: Explains the implementation of sparse voxel tracing for diffuse lighting and how it interacts with hardware triangle tracing.
The following papers and technical reports discuss the exact mechanisms used by such files (like the one you found) to compromise systems: 1. Malware Analysis and Detection Techniques