A malicious actor has contacted multiple individuals at a company over multiple months in order to convince unsuspecting users to execute a malicious file on their systems. By doing so, the actor could covertly gain control of those systems and establish a presence inside the network. Which type of malware was the actor attempting to have the users execute?