A Trojan Horse is a piece of software that pretendes to be innocent but in reality is a malicious program, so that it can entice you to install itself.
Some of the characteristics of Trojan Horses are:
Once a trojan is installed on your computer it has as much access to your computer as you do.
It does so by installing/opening a backdoor to the system(like a reverse shell), through which a malicious actor can access the system.
This is a caregory of Trojans that can provide administrative control to the attackers.It is installed as a service into the victim's computer and with the help of a client software, an attacker can have unprecendeted access to your computer.
It can be used to remotely control a device.
Once installed, it can accomplish the following things:
Example: DarkComet RAT