CIA operators reportedly use Assassin as being a C2 to execute a number of jobs, obtain, and after that periodically send out consumer data to the CIA Listening Post(s) (LP). Much like backdoor Trojan behavior. Both of those AfterMidnight and Assassin operate on Windows working process, are persistent, and periodically beacon to their configured LP