The threat,
which works on both 32-bit and 64-bit Windows systems, can execute arbitrary commands, hide system activities, steal files, and capture network traffic. It’s designed in a way that allows its creators to extend its functionality by adding new modules.