"Upon execution, the malware attempts to receive remote instructions from a command server that can create reverse shell backdoors on the victim's system," Armstrong said. "The threat actors ...