• A Wrapper is a program used to combine two or more executable into a single packaged program.
• The wrapper attaches a harmless executable, like a game, to a Trojan’s payload, the executable code that does the real damage, so that it appears to be a harmless file.
• Hackers use Wrappers to bind the Server part of the Software behind any image or any other file. Wrappers are also known as Binders.
• Generally, games or other animated installations are used as wrappers because they entertain the user while the Trojan in, being installed.
• This way, the user doesn’t notice the slower processing that occurs while the Trojan is being installed on the system—the user only sees the legitimate application being installed.
Detection and Removal of Trojans
The unusual behavior of system is usually an indication of a Trojan attack. Actions/symptoms such as,
• Programs starting and running without the User’s initiation.
• CD-ROM drawers Opening or Closing.
• Wallpaper, background, or screen saver settings changing by themselves.
• Screen display flipping upside down.
• Browser program opening strange or unexpected websites
All above are indications of a Trojan attack. Any action that is suspicious or not initiated by the user can be an indication of a Trojan attack.
One thing which you can do is to check the applications which are making network connections with other computers.
One of those applications will be a process started by the Server Trojan.
The key to prevent Trojans and backdoors from being installed on a system is not to install applications downloaded from the Internet or open Email attachments from parties you don’t know.
Software used to find the presence of a Trojan is,
1. Process explorer
2. Anti-virus with anti-Trojan capabilities
3. TCP view.
By these you can reduce the risk of being attacked by a Trojan. Hope this tutorial is useful to you. Feel free to comment…
0 comments