Backdoor Shell Dropper Deploys CMS-Specific Malware
This kind of destructive dropper is tricky to detect due to the fact its target is not to directly execute a backdoor, remote shell, or file add, but somewhat link attackers to other malicious sources.