It embeds the executable file or payload In the jpg file. the strategy the program takes advantage of isn't really exactly named one of several steganography approaches.
free of charge purpose-guided coaching designs https://www.darkexploits.com/product/extremely-silent-jpg-exploit-new/