Backdoor Shell Dropper Deploys CMS-Specific Malware

This kind of destructive dropper is tricky to detect due to the fact its target is not to directly execute a backdoor, remote shell, or file add, but somewhat link attackers to other malicious sources.