A cybersecurity analyst discovered a suspicious binary suspected of being malware on the company's network. The analyst decided to perform reverse engineering to understand its behavior. Which tool would be most appropriate for this task?
Nmap
GDB
OpenVAS
Immunity Debugger