Watch this video on YouTube
In which of the following malware components does an attacker embed notorious malware files that can perform the installation task covertly?