CIA operators reportedly use Assassin like a C2 to execute a number of tasks, accumulate, after which periodically send out consumer info towards the CIA Listening Submit(s) (LP). Similar to backdoor Trojan behavior. Both AfterMidnight and Assassin operate on Windows operating process, are persistent, and periodically beacon to their configured LP