Executing an inert trojan that will attempt to connect to 192.168.0.1 on TCP port 444. This will be detected and killed by CrowdStrike's on-sensor machine learning with the aggressive policy settings enabled. ./bin/Reverse_Shell_Trojan.sh: line 5: 704760 Killed ./bin/evil/sample