When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

The backdoor is capable of executing PowerShell commands, can self-destruct, and checks for and executes predefined commands.

Then, it uses a separate function to continuously listen for incoming commands from a Telegram chat.

Telegram

Before executing any predefined actions, themalwareverifies the received commands validity.