Which Trojan can be embedded as a macro in an MS Word document and covertly creates registry keys and processes, then connects to multiple malicious C2 servers?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which Trojan can be embedded as a macro in an MS Word document and covertly creates registry keys and processes, then connects to multiple malicious C2 servers?

Explanation:
This question tests how macro-delivered malware uses Word documents to load a payload, persist on a system, and reach out to multiple control servers. A Trojan with macro capability can hide inside a Word document’s VBA code, execute when the document is opened, and then install itself by creating registry keys for persistence, start new processes, and establish connections to several command-and-control servers to receive instructions and exfiltrate data. Covert Credential Grabber fits this scenario because it is described as covertly harvesting credentials and operating through a macro-driven, multi-stage process that maintains persistence and communicates with multiple C2 endpoints. HTML Injection isn’t a Trojan delivered by a Word macro; it’s a web attack technique that injects malicious HTML into webpages. GlitchPOS is a POS-focused malware family aimed at card data theft, not a macro-based Word document Trojan that adds registry keys and uses multiple C2 servers. TAN Gabber does not align with the described macro-delivered, multi-C2, persistence-focused behavior.

This question tests how macro-delivered malware uses Word documents to load a payload, persist on a system, and reach out to multiple control servers. A Trojan with macro capability can hide inside a Word document’s VBA code, execute when the document is opened, and then install itself by creating registry keys for persistence, start new processes, and establish connections to several command-and-control servers to receive instructions and exfiltrate data. Covert Credential Grabber fits this scenario because it is described as covertly harvesting credentials and operating through a macro-driven, multi-stage process that maintains persistence and communicates with multiple C2 endpoints.

HTML Injection isn’t a Trojan delivered by a Word macro; it’s a web attack technique that injects malicious HTML into webpages. GlitchPOS is a POS-focused malware family aimed at card data theft, not a macro-based Word document Trojan that adds registry keys and uses multiple C2 servers. TAN Gabber does not align with the described macro-delivered, multi-C2, persistence-focused behavior.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy