diff --git a/monkey/infection_monkey/config.py b/monkey/infection_monkey/config.py index ac7084bd3..117875bb4 100644 --- a/monkey/infection_monkey/config.py +++ b/monkey/infection_monkey/config.py @@ -101,9 +101,6 @@ class Configuration(object): # sets whether or not the monkey is alive. if false will stop scanning and exploiting alive = True - # sets whether or not to self delete the monkey executable when stopped - self_delete_in_cleanup = False - # string of the mutex name for single instance singleton_mutex_name = "{2384ec59-0df8-4ab9-918c-843740924a28}" diff --git a/monkey/infection_monkey/example.conf b/monkey/infection_monkey/example.conf index aab1a2a5d..1d3e3235c 100644 --- a/monkey/infection_monkey/example.conf +++ b/monkey/infection_monkey/example.conf @@ -57,7 +57,6 @@ "smb_service_name": "InfectionMonkey", "retry_failed_explotation": true, "self_delete_in_cleanup": true, - "serialize_config": false, "singleton_mutex_name": "{2384ec59-0df8-4ab9-918c-843740924a28}", "skip_exploit_if_file_exist": false, "exploit_user_list": [], diff --git a/monkey/infection_monkey/monkey.py b/monkey/infection_monkey/monkey.py index fdb945978..cc9045408 100644 --- a/monkey/infection_monkey/monkey.py +++ b/monkey/infection_monkey/monkey.py @@ -343,7 +343,7 @@ class InfectionMonkey(object): status = ScanStatus.USED if remove_monkey_dir() else ScanStatus.SCANNED T1107Telem(status, get_monkey_dir_path()).send() - if WormConfiguration.self_delete_in_cleanup and -1 == sys.executable.find("python"): + if -1 == sys.executable.find("python"): try: status = None if "win32" == sys.platform: