A lot of focus on the malware itself, but not so much on the misconfigurations and vulnerabilities which enable it. Would love to see that list. Other than that, the evasion techniques look pretty traditional.
And of course the privilege escalation is done by a polkit vulnerability...
And of course the privilege escalation is done by a polkit vulnerability...