Hey guys :)
I'm currently writing my master thesis on interacting malware. Just recently, I found a blog post about the following scenario:
Malware was installed in multiple instances in a system. However, only the primary instances actually showed malicious behavior. The secondary instances remained dormant thereby monitoring whether the primary instances were still "alive". The secondary instances would, however, activate when the primary instances were removed.
Though I conducted a thorough research, I could not find any other description of a similar case or even an actual example. So I wanted to ask you, if this is actually a thing or if it is just some weird story on a blog?
If you know about such a case, maybe you could provide an example :)
Thanks very much in advance for your help!