: Allows an attacker to run shell commands on a compromised host.
If you are investigating this file in a security context, it is probably a package containing the Merlin agent or server components. : Post-exploitation / C2 Framework. merlin2.zip
If this file was found on an unauthorized system, you should include the following in your report: : Allows an attacker to run shell commands
: Check for network connections to unusual IP addresses, specifically those using port 443 with HTTP/2 protocols. merlin2.zip