: Turns the infected device into a "zombie" used for coordinated attacks or further malware distribution.

If you have already downloaded this file, Instead: Malware Analysis - CISA

: Stealthily captures login credentials, keystrokes, and browsing habits to send to remote servers.