The malware itself is made up of a number of elements, though in order to simplify, we will use the term ???Trojan horse??? to describe it. (Technically, it propagates as a worm, is installed via a Trojan Horse, and installs a rootkit, backdoor, command and control, and other elements.)