Eight Ways to trigger a Trojan

Source: Internet
Author: User

◆ Registry
Open the five primary keys Run and RunServices under HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion to find the key value that may be used to start the Trojan.
◆ WIN. INI
C: WINDOWS directory has a configuration file win. ini, which can be opened in text mode. The windows field contains the startup commands load = and run =, which are normally blank. If there is a startup program, it may be a Trojan.
◆ SYSTEM. INI
C: There is a configuration file system. ini in the WINDOWS directory, which is opened in text mode. There are command lines in 386Enh, mic, and drivers32, where you can find the startup command of the Trojan.
◆ Autoexec. bat and Config. sys
These two files in the C-drive root directory can also start Trojans. However, this loading method usually requires the control end user to establish a connection with the server, and then upload the file with the same name as the trojan startup command added to the server to overwrite the two files.
◆ *. INI
That is, the application startup configuration file. The control end uploads the file with the same name as the trojan startup command to the server to overwrite the file with the same name, in this way, the Trojan can be started.
◆ Registry
Open the primary key of the HKEY_CLASSES_ROOT file type \ shellopencommand and view its key value. For example, a Chinese Trojan "glacier" is used to modify the key value under HKEY_CLASSES_ROOTxtfileshellopencommand, and "C: windows notepad. change EXE % 1 to "C: WINDOWSSYSTEMSYSEXPLR. EXE % 1 ", when you double-click a TXT file, the original application NOTEPAD opened the file, but now it becomes the start of the Trojan program. It should also be noted that not only TXT files, but Trojans can be started by modifying the key values of startup commands for HTML, EXE, ZIP and other files, the difference lies only in the difference of the primary key "file type". TXT is txtfile and ZIP is WINZIP. You can try to find it.
◆ Bundling files
To implement this trigger condition, you must first establish a connection between the control end and the server end through a Trojan, and then control the end user to bind the trojan file with an application using the tool software, upload the file to the server to overwrite the original file, so that even if the trojan is deleted, the trojan will be installed as long as the application bound with the trojan is run.
◆ Start Menu
The start-Program-start option may also have a trojan trigger condition.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.