Simple Trojan with Python
Understanding and Creating a simple Trojan with Python
Last updated
Understanding and Creating a simple Trojan with Python
Last updated
When a trojan is executed on a victims machine, it will first pretend it is a legitamte process to evade EDR and anti virus tools that will typically first scan it for known malware signatures. Then it will look at the behaviour of the file to see what processes it tries to interact with, this could be a range of things from Keylogging to file extraction or even establishing a remote connection. As I mentioned Trojans can bypass this by using techniques like Process Hollowing.