Cryptocurrency Mining Malware uses Various Evasion Techniques, Including Windows Installer, as Part of its Routine
In Summary : The concept of a stealthy, difficult-to-detect malware operating behind the scenes has proven to be an irresistible propositi...
https://updatesinfosec.blogspot.com/2018/11/cryptocurrency-mining-malware-uses.html

The concept of a stealthy, difficult-to-detect malware operating behind the scenes has proven to be an irresistible proposition for many threat actors [...]
kindly refer the following link as follow up :
https://ift.tt/2yXEHaP