The malware is written in C++ and has many capabilities, the developers are actively adding features and offer support for current and future features.
Once a machine has been infected the malware will identify competing malware processes and terminate them, it then creates time-based execution processes and startup items.
MikuBot also has the ability to create AV exclusions and perform discovery tasks via WMI as well as launch HVNC to allow the threat actor to remotely access and manage the victim machine.