Malware can be complicated and hard to analyze without years of experience and a computer science degree. Not all malware created equal and the best way to learn about malware is to look at some easy malware deployment methods to develop pattern recognition and critical thinking.
Old methods die hard and this example explores the way malware still uses hosts file hijacking that's been around since the dawn of the Internet. This example also explores basic registry modification malware can perform in order to make the hosts file and the infestation consistent on the local system.
Analysis is logic and not magic!!!
http://youtu.be/suG8NafYI3E