Trojan Horse

Malware disguised as legitimate software, examined in forensics to uncover its deployment, payload, or impact on a compromised system.