According to http://vil.nai.com/vil/content/Print99296.htm the name of the trojan is configurable by by the hacker who customises it.