Jesse receives an email with an attachment labeled -Court_Notice_21206.zip-. Inside the zip file is a
file named -Court_Notice_21206.docx.exe- disguised as a word document. Upon execution, a window appears stating, -This word document is corrupt.- In the background, the file copies itself to Jesse APPDATA\local directory and begins to beacon to a C2 server
to download additional malicious binaries.
What type of malware has Jesse encountered?
A. Trojan
B. Worm
C. Macro Virus
D. Key-Logger
In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a comput
er by misleading users of its true intent. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.
References: