CIA operators reportedly use Assassin to be a C2 to execute a number of duties, gather, then periodically ship user facts to your CIA Listening Write-up(s) (LP). Similar to backdoor Trojan habits. Each AfterMidnight and Assassin run on Windows operating procedure, are persistent, and periodically beacon for their configured LP to possibly request r