This study discusses using FTK Imager software for live forensic investigations in order to track and analyze Remote Access Trojan assaults. In addition to helping organizations safeguard their assets and data against harmful cyberattacks, our research aims to improve computer system security. The knowledge of the presence of the Remote Access Trojan virus, notwithstanding its removal, is the advantage of this research. Installation of Kali Linux, forensic analysis using FTK Imager, and the development and usage of viruses are all part of this study methodology. The process included installing Kali Linux as a platform for the creation and execution of viruses, identifying and analyzing the presence of viruses using FTK Imager, and identifying and analyzing Remote Access Trojan attacks using disk and memory forensic analysis techniques. The research findings indicate that as soon as the target opens the generated virus, the executor gains complete access to the target machine. This allows the executor to follow the target around and record everything it does. As a forensic investigation tool, FTK Imager must be installed on the target in order to detect the virus that the executor developed. The target will thus find it simpler to use memory forensics or disk forensics to look for files created by the executor. describes how to use FTK Imager software to observe and analyze Remote Access Trojan assaults for use in real-world forensic investigations.