What stealer has the ability to load other malware? and be able to turn on the computer after it has been turned off. Able to launch a Trojan and run it?
He's asking if the stealer malware can persist reboots or will a system reboot kill the malware. These malwares change registry keys and use other persistent methods so to answer his question. Yes it will persist and survive reboots but you need to do your own research and find a good vendor.Any.
Just change the source code to download and execute further payloads,or load a embed one, like shellcode in the stealer itself. There are a lot of ways.
"and be able to turn on the computer after it has been turned off"
what?
YesHe's asking if the stealer malware can persist reboots or will a system reboot kill the malware. These malwares change registry keys and use other persistent methods so to answer his question. Yes it will persist and survive reboots but you need to do your own research and find a good vendor.
It was difficult. Because I don't have the ability to write programs and modify code.Any.
Just change the source code to download and execute further payloads,or load a embed one, like shellcode in the stealer itself. There are a lot of ways.
"and be able to turn on the computer after it has been turned off"
what?