Sınıf: Trojan-Dropper
Trojan-Dropper programları, kurban bilgisayarlarına kodlarının içerdiği kötü amaçlı programları gizlice yüklemek için tasarlanmıştır. Bu tip kötü amaçlı program genellikle bir dizi dosyayı kurbanın sürücüsüne (genellikle Windows dizinine, Windows sistem dizinine, geçici dizine vb.) Kaydeder ve bunları herhangi bir bildirimde bulunmadan başlatır (veya bir arşiv hatasıyla ilgili sahte bildirim ile) eski işletim sistemi sürümü, vb. Bu tür programlar hackerlar tarafından kullanılır: Trojan programlarını ve / veya virüsleri gizlice yüklemek, bilinen kötü amaçlı programları antivirüs çözümleri tarafından algılanmaktan korur; Tüm antivirüs programları bu tip Truva atlarının içindeki tüm bileşenleri tarayamaz.Platform: Win32
Win32, 32-bit uygulamaların yürütülmesini destekleyen Windows NT tabanlı işletim sistemlerinde (Windows XP, Windows 7, vb.) Bir API'dir. Dünyanın en yaygın programlama platformlarından biri.Aile: Trojan-Dropper.Win32.Agent
No family descriptionExamples
775E94C0AAAB4E18513C24F9DB083405494119D1EFC70246D695C9A1B9E58960
F1B1E1DAA540516E6B99520AFC99C420
E6BC25628AE52172CD048FBED0F3B702
2D1FA1E36380ADB386DC8894AC7B709B
Tactics and Techniques: Mitre*
TA0005
Defense Evasion
The adversary is trying to avoid being detected.
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.
T1036.002
Masquerading: Right-to-Left Override
Adversaries may abuse the right-to-left override (RTLO or RLO) character (U+202E) to disguise a string and/or file name to make it appear benign. RTLO is a non-printing Unicode character that causes the text that follows it to be displayed in reverse. For example, a Windows screensaver executable named
Adversaries may abuse the RTLO character as a means of tricking a user into executing what they think is a benign file type. A common use of this technique is with Spearphishing Attachment/Malicious File since it can trick both end users and defenders if they are not aware of how their tools display and render the RTLO character. Use of the RTLO character has been seen in many targeted intrusion attempts and criminal activity.(Citation: Trend Micro PLEAD RTLO)(Citation: Kaspersky RTLO Cyber Crime) RTLO can be used in the Windows Registry as well, where regedit.exe displays the reversed characters but the command line tool reg.exe does not by default.
March 25 \u202Excod.scr will display as March 25 rcs.docx. A JavaScript file named photo_high_re\u202Egnp.js will be displayed as photo_high_resj.png.(Citation: Infosecinstitute RTLO Technique)Adversaries may abuse the RTLO character as a means of tricking a user into executing what they think is a benign file type. A common use of this technique is with Spearphishing Attachment/Malicious File since it can trick both end users and defenders if they are not aware of how their tools display and render the RTLO character. Use of the RTLO character has been seen in many targeted intrusion attempts and criminal activity.(Citation: Trend Micro PLEAD RTLO)(Citation: Kaspersky RTLO Cyber Crime) RTLO can be used in the Windows Registry as well, where regedit.exe displays the reversed characters but the command line tool reg.exe does not by default.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.