Home Malware Programs Remote Administration Tools Jack Trojan

Jack Trojan

Posted: March 28, 2006

Jack Trojan is a Remote Administration Tool (or RAT) Trojan. Although RATs can be benevolent, Trojans like Jack Trojan use their capabilities to allow remote attackers to take full control over your computer. Jack Trojan has seen several variants that may behave in slightly different ways, and you shouldn't assume that your anti-malware can effectively protect you against one type of Jack Trojan, even if it can protect you against another type. Jack Trojan was first seen and had Jack Trojan's peak in 2003, but still represents a serious threat to any PC Jack Trojan infects, and should be considered a high-level security and privacy threat.

Jack Trojan's Origin and Statistics

Jack Trojan was first seen in 2003 after being created in Visual C++ by the French hacker identified by the nickname 'Shad0w.' In that same year Jack Trojan went through a number of different versions beginning with Jack Trojan 1.1 beta and ending with Jack Trojan 2.0.

You might also see Jack Trojan by other names like Backdoor/Jacktron.11!Server, Backdoor Program.LC and Backdoor.Jacktron.11, which are all different names that certain anti-malware programs use for Jack Trojan labels.

Initial Jack Trojan infects are reported to use spam email, but once Jack Trojan infects a computer, Jack Trojan may also be able to spread between computers by using shared network resources.

Don't Take These Attacks from Jack Trojan

As a Remote Administration Tool, Jack Trojan functions in two parts – one part of Jack Trojan is the client on a remote criminal computer, while the infection part of Jack Trojan creates a server on your PC. You might be able to recognize Jack Trojan's activities, since Jack Trojan uses file processes that can be identified by their names, like client.exe. Memory processes like Jack Trojan's client.exe can be seen in your Windows Task Manager, which can be accessed with Control + Alt + Delete.

Besides the memory processes, you might not see any visual indications that Jack Trojan is active, but that doesn't mean your computer is secure. Remote Administrations Tools like Jack Trojan can allow an anonymous criminal to monitor and control all activity on your PC, which places all files and information, including account passwords and login info, at risk.

Don't try to delete Jack Trojan without the help of an appropriately advanced anti-malware scanner, unless you have no other options. Most Trojans like Jack Trojan will include components that are difficult to remove, and you may experience a variety of system problems, including loss of Internet connectivity, if you remove Jack Trojan components in the wrong way.

File System Modifications

  • The following files were created in the system:
    # File Name
    1 client.exe
    2 lisezmoi.txt
    3 serveur.exe
    4 serveur[inoffensif].exe

Registry Modifications

  • The following newly produced Registry Values are:
    HKEY..\..\..\..{RegistryKeys}HKEY_LOCAL_MACHINEsoftwaremicrosoftwindowscurrentversionunrja32.exe

Related Posts

Loading...