The components undertake certain roles including setting up persistence within the breached system, evading detection, dropping a backdoor, and making sure malware propagation as a result of recently connected USB drives.These are typically two differing types of USB connections. UDP flash drives are created under a more recent technological know-h