For example, let's say you want to restart a service across 5 PCs. In Bash, you'd need SSH access, a shared key, and a loop.
A malware that steals credentials and cryptocurrencies uses Unicode for invisible code and installs a remote access trojan.