Malware researchers analyzing the Zebrocy kit determined that the operators run commands manually to collect information of interest from infected systems. […]
Click here for original story, Zebrocy Operators Also Look for Browser and Email Databases
Source: Bleeping Computer