CIA operators reportedly use Assassin for a C2 to execute a series of jobs, accumulate, then periodically send consumer knowledge into the CIA Listening Post(s) (LP). Similar to backdoor Trojan behavior. Both AfterMidnight and Assassin run on Windows running procedure, are persistent, and periodically beacon to their configured LP to both ask for r