CIA operators reportedly use Assassin as being a C2 to execute a number of duties, collect, and then periodically deliver consumer knowledge on the CIA Listening Write-up(s) (LP). Comparable to backdoor Trojan conduct. The two AfterMidnight and Assassin run on Windows running process, are persistent, and periodically beacon for their configured LP