It could be there for the shock value, or it could be [that the Trojan was distributed by] people who really believe in this thing. It's probably not a joke. |
Normally, it sits on your machine, resident in memory, and waits for some kind of trigger. If it sees a secure connection starting, it begins logging that connection. It then reports [logged information] to a central location. |