Certified Ethical Hacker – CEH – 312-50 – Question269

Jesse receives an email with an attachment labeled Court_Notice_21206.zip. Inside the zip file is a file named Court_Notice_21206.docx.exe disguised as a word document. Upon execution, a window appears stating, This word document is corrupt. In the background, the file copies itself to Jesse APPDATAlocal directory and begins to beacon to a C2 server to download additional malicious binaries.

What type of malware has Jesse encountered?


A.
Trojan
B. Worm
C. Macro Virus
D. Key-Logger

Correct Answer: A

Explanation:

In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.

References: https://en.wikipedia.org/wiki/Trojan_horse_(computing)