<\/a><\/figure><\/div>\n\n\n<\/p>\n\n\n\n
The botnet’s functionality is implemented through four distinct modules, respectively named as persistence, proxy, silivaccine, and zombie.<\/p>\n\n\n\n
The silivaccine module allows to bot to remove competing malware, while the module ‘zombie’ implements the full botnet functionality. The zombie module reports sensitive information from the compromised device to the C2 and awaits commands, it supports six types of DDoS attacks, scanning, reverse shell, and other functions.<\/p>\n\n\n\n