What type of malware has Jesse encountered?

Jesse receives an email with an attachment labeled “Court_Notice_21206.zip”. Inside the zip file is a file named
“Court_Notice_21206.docx.exe” disguised as a word document. Upon execution, a window appears stating,
“This word document is corrupt.” In the background, the file copies itself to Jesse APPDATA\\local directory and
begins to beacon to a C2 server to download additional malicious binaries.
What type of malware has Jesse encountered?

Jesse receives an email with an attachment labeled “Court_Notice_21206.zip”. Inside the zip file is a file named
“Court_Notice_21206.docx.exe” disguised as a word document. Upon execution, a window appears stating,
“This word document is corrupt.” In the background, the file copies itself to Jesse APPDATA\\local directory and
begins to beacon to a C2 server to download additional malicious binaries.
What type of malware has Jesse encountered?

A.
Trojan

B.
Worm

C.
Macro Virus

D.
Key-Logger

Explanation:
In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a
computer by misleading users of its true intent. Although their payload can be anything, many modern forms act
as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.
https://en.wikipedia.org/wiki/Trojan_horse_(computing)



Leave a Reply 0

Your email address will not be published. Required fields are marked *