Which is uncharacteristic of a Trojan horse program used to escalate privileges?

A.
It is installed in /usr/bin.
B.
It is owned by a normal user.
C.
It has the same name as a common program.
D.
It contains additional functionality which the user does not expect.