BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

How to analyze Trojan with ANY.RUN

Top malware of this type

Family
Type
Trend changes
Tasks overall
  • 2

    Crimson RAT

    Trojan
    0,0,0,0,0,0,0,0,0,0,1,5,16,2,6,13,34,43,11,13,13,15,9,4,7,11,8,9,1,1,0,5,1,4,1,5,1,1,2,1,0,1,0,0,0,0,0,1,0,0,3,0
    95
    311
  • 3

    KrakenKeylogger

    Trojan
    0,0,0,0,0,0,5,10,3,0,1,1,1,4,5,2,3,8,8,10,7,5,8,17,8,7,6,12,10,12,23,17,6,19,4,1,10,6,7,3,0,0,0,11,2,0,7,1,0,0,2,1
    92
    332
  • 4

    Trickbot

    Trojan
    0,0,8,19,38,74,121,99,59,224,132,63,235,379,236,427,404,155,86,59,46,164,42,35,78,26,20,20,20,18,106,26,17,16,34,4,7,8,0,0,0,2,1,0,0,0,0,0,0,0,6,8
    32
    4925
  • 5

    Adwind

    Trojan
    0,0,38,143,173,320,280,113,120,319,235,154,145,109,163,140,47,34,47,60,10,47,25,11,25,10,10,10,16,29,4,8,3,16,10,17,29,5,4,3,0,12,30,24,19,7,13,11,39,59,84,94
    37
    4162
  • 6

    Agent Tesla

    Trojan
    0,0,12,34,19,33,518,173,80,255,364,508,1314,1914,1777,1826,1631,1232,1002,786,503,489,484,344,490,430,196,184,169,229,176,168,217,919,1072,1400,802,1660,920,534,330,303,1685,1848,5439,1712,1382,1660,2009,1894,988,1210
    5
    37768
  • 7

    Revenge

    Trojan
    0,0,0,0,4,14,8,17,12,39,55,43,58,28,20,55,31,42,52,82,48,50,43,112,70,60,81,54,29,57,20,30,40,29,13,12,49,14,17,12,7,8,8,5,51,3,5,12,15,10,22,61
    55
    1639
  • 8

    Netwire

    Trojan
    0,0,5,11,12,29,69,65,50,97,91,76,94,153,258,214,222,236,184,203,80,83,80,68,77,68,48,56,82,64,33,33,54,118,95,140,85,80,50,50,20,17,18,20,34,19,8,8,19,9,11,46
    36
    4176
  • 9

    Gootkit

    Trojan
    0,0,15,42,52,10,6,18,51,87,77,170,30,54,41,15,12,7,12,14,6,5,10,17,9,10,9,9,7,23,14,20,14,14,7,6,3,0,6,5,13,4,16,6,4,1,1,2,0,1,1,0
    65
    1192
  • 10

    Ursnif

    Trojan
    0,0,22,78,81,72,277,283,354,671,566,412,393,617,648,357,329,587,290,477,149,203,178,84,25,31,57,27,37,32,61,33,72,29,25,19,12,5,19,34,9,3,15,0,74,2,2,3,5,10,13,3
    17
    9544
  • 11

    Metamorfo

    Trojan
    0,0,0,0,0,0,0,0,0,0,0,0,0,0,7,19,23,49,18,0,0,0,1,0,0,2,0,0,0,0,0,1,0,2,0,0,2,0,1,4,0,4,2,14,20,30,50,37,29,3,19,11
    81
    556
  • Last Seen at

    Recent blog posts

    post image
    Malware Analysis Report in One Click
    watchers 7289
    comments 0
    post image
    Cyber Information Gathering: Techniques and T...
    watchers 451
    comments 0
    post image
    ANY.RUN’s Upgraded Linux Sandbox for Fast and...
    watchers 572
    comments 0

    What is a trojan malware?

    According to the standard trojan malware definition, it is malicious software that pretends to be legitimate in order to deceive victims into downloading and executing it.

    However, attackers now frequently distribute trojans via loaders, and as a result, advanced disguises are unnecessary and may not go beyond simply mimicking the name of a legitimate process. Additionally, trojan attacks often make use of social engineering tactics, spoofing, and phishing to persuade the user to take the desired action.

    The most common purpose for these malicious programs is to gain unauthorized access to a user's computer and extract sensitive files and data, including credit card information and private email addresses. Trojans are often used to distribute other types of threats, including ransomware that encrypts users’ files and demanding payment for their decryption.

    Get started today for free

    Analyze malware and phishing in a fully-interactive sandbox

    Create free account

    What can a trojan do to a computer?

    The core functionality of such malware can vary significantly depending on its type (e.g., remote access trojan or trojan spyware). However, the most common features include:

    • Data theft: Steals sensitive data from the infected computer, such as passwords, credit card numbers, and social security numbers.
    • Keylogging: Records all keystrokes typed on the infected computer.
    • Remote access: Lets attackers to remotely control the infected computer.
    • Downloading and installing other malware: Drops extra payloads on the infected computer.
    • Modifying system files: Modifies system files to disable security software, create backdoors, and perform other malicious activities.
    • Spreading through network connections: Spreads to other computers on the same network.

    Some types of this computer virus can target specific spheres. For instance, banking trojan malware is designed to steal banking credentials and other sensitive financial information, such as credit card and social security numbers. They can also be used to take over a user's online banking account and perform fraudulent transactions.

    How do trojans spread?

    Attackers have devised a variety of methods for infiltrating computers to deploy a trojan virus, including email attachments, infected websites, and file sharing platforms. When a user interacts with these sources by downloading and executing a malicious file, the trojan can be installed on their device without their knowledge.

    Email phishing campaigns remain the most common vector of infection. Social engineering plays a significant part in how criminals manage to carry out successful attacks involving trojans.

    Their tactics may include sending out thousands of spam emails on the part of a trusted entity, such as an actual brand or government organization, or using intimidation to scare the victim and persuade them to perform harmful actions.

    For instance, criminals behind one of the phishing campaigns aimed at spreading the STRRAT trojan targeted individuals on behalf of the MAERSK shipping corporation.

    How can a trojan gain access to a computer?

    A typical trojan malware infection chain follows these steps:

    1. Initial access: Typically, an unknowing user downloads a trojan as an email attachment or a file from a website.
    2. Execution: Once the trojan is delivered to the victim's computer, it typically installs itself by exploiting a vulnerability in the operating system or in other software applications.
    3. Persistence: Once installed, the trojan tries to persist on the system to continue running even after the victim reboots their computer. This may be done by modifying the system registry or by installing itself as a system service.
    4. Privilege escalation and lateral movement: The malware then attempts to gain higher permissions on an infected system by exploiting security gaps. In many cases, the malicious program manages to disseminate across the entire network through lateral movement.
    5. Collection and exfiltration: In this stage, the trojan gathers the information from targeted systems and exfiltrates it to a remote server called the command-and-control center (C2). It may also communicate with the C2 to download additional malware or receive commands.
    6. Impact: Some trojans may disrupt organizations’ operations by tampering with data and interrupting internal processes. For instance, ransomware trojans can encrypt files and, thus, prevent a targeted company from functioning.

    Remcos process tree Execution processes of Remcos displayed by the ANY.RUN malware sandbox

    Using the Remcos trojan as an example, we can trace this entire process in action by uploading a sample of this malware to the ANY.RUN interactive malware sandbox.

    The Remcos trojan can be delivered in different forms. In our case, the entire infection chain starts with an executable file, which, once launched, initiates a VBS script that runs a command line and drops an executable file. This file is the main payload, which carries out malicious activities such as stealing information, changing the autorun value in the registry, and connecting to the C2 server.

    What are examples of the most persistent trojans today?

    The threat landscape is changing by the hour and the popular trojans today may be gone forever tomorrow. To stay in the know about the latest trends in malware, as well as collect fresh indicators of compromise and samples, use ANY.RUN’s Tracker.

    Here are some of the most active trojan families according to the service:

    • RedLine: This trojan poses a significant threat to users by collecting their private information and distributing various damaging programs. The versatility of the software means that it can cause considerable harm to both personal and enterprise devices, leading to financial loss and data breaches.
    • NjRAT: One of the most readily available RATs in current operation. There are plenty of educational resources providing guidance to aspiring attackers on how to use it.
    • Agent Tesla: It is a program that is marketed as legitimate software but is actually a trojan spyware that collects sensitive information about its victims. It records users’ keystrokes and interactions to obtain personal data without their knowledge.

    How can I detect a trojan?

    Despite the prevalence of trojan viruses, detecting them can be extremely challenging. They often use sophisticated techniques to evade detection from antivirus programs, making them a serious threat to cybersecurity.

    Yet, uploading any suspicious file or link to the ANY.RUN malware sandbox can help you quickly discover if the sample under inspection is a trojan, another type of malware, or a completely safe file. The service also shows the entire execution path of the sample and displays its network traffic activity.

    Additionally, ANY.RUN enables you to interact with files, links, and the infected system in a safe VM environment like you would on a normal computer.

    You can also use the sandbox to gain the information needed to ensure timely malware trojan removal.

    Try ANY.RUN for free – request a demo!

    HAVE A LOOK AT

    Dridex screenshot
    Dridex
    dridex trojan banker
    Dridex is a very evasive and technically complex banking trojan. Despite being based on a relatively old malware code, it was substantially updated over the years and became capable of using very effective infiltration techniques that make this malware especially dangerous.
    Read More
    Emotet screenshot
    Emotet
    emotet trojan loader banker
    Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.
    Read More
    Quasar RAT screenshot
    Quasar RAT
    quasar trojan rat
    Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely.
    Read More
    Netwire screenshot
    Netwire
    netwire trojan rat loader
    Netwire is an advanced RAT — it is a malware that takes control of infected PCs and allows its operators to perform various actions. Unlike many RATs, this one can target every major operating system, including Windows, Linux, and MacOS.
    Read More
    Ursnif screenshot
    Ursnif
    ursnif gozi dreambot trojan loader
    Ursnif is a banking Trojan that usually infects corporate victims. It is based on an old malware but was substantially updated over the years and became quite powerful. Today Ursnif is one of the most widely spread banking Trojans in the world.
    Read More
    Adwind screenshot
    Adwind
    adwind trojan
    Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
    Read More