I suspect the intruders would use the code to find vulnerabilities in other companies. Which they can use for easy ransomware access or straight up stealing customer data. Or both. Much less trouble than analysing and running someone else’s software.