Archive A Reconstructed © MegaSecurity Database
D0ped
Released 23 years, 7 months ago. September 2002
Copyright © MegaSecurity
By Zeromatic
Informations
| Author | Zeromatic |
| Family | D0ped |
| Category | Remote Access |
| Version | D0ped |
| Released Date | Sep 2002, 23 years, 7 months ago. |
| Language | Visual Basic |
Additional Information
Server:
size: 184.320 bytes
port: 1661 TCP
startup:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run "Rundll32"
Author Information / Description
d0ped Trojan is a client/server thing, running under any Windows9x or XP.
The zip-file containing this textfile, also includes a setup file.
Install the packets, then walk through the Start/Program menu. You'll find
a new menue called "Telhack Inc", whereunder you'll find the Client app.
The server application is simply named "d0ped.exe" as default.
As far as i know, CTRL-ALT-DEL (which - ofcourse - your'e able to disable:)
list will display the EXE-name of the file as a running process.
You might see this "trojan" as a later version of the "Rths"-trojan?
Well HECK it's not! This one is not to be controlled by any
terminal session, it has its own client application. The d0ped Trojan
also contain a lots of (new) amusing functions, for example:
* Snoop on users Internet Explorer navigation
* Edit filesystem
* Process and hardware status
* Constant change-of-system-wide-parameters status
* Hide mousecursor
* Very nice black textscreen function
* A silly "Please Enter passwords:" function
* Automatic search for Internet login/password
* Desktop management
* "Use 'Em": use the server to initiate a third session.
(Use the target as a secound terminal).
* Or initiate a hidden pingflood against.. anything.
* Desktop Management
* Port- and Password Settings
* A cute "incomming data"-textbox
- Default port is: 1661
- There is no password set as default.
Zeromatic
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.