Malware is not often automated, so this stage happens manually. This step is once a system is compromised or infected. This is why "hunting" is a popular tactic …

This article was originally published here