Archive A Reconstructed © MegaSecurity Database
dSocks4
Released 22 years, 11 months ago. May 2003
Copyright © MegaSecurity
By Drocon
Informations
| Author | Drocon |
| Family | dSocks4 |
| Category | Stealth Proxy |
| Version | dSocks4 |
| Released Date | May 2003, 22 years, 11 months ago. |
| Language | Assembly |
Additional Information
Server:
Dropped File:
c:\WINDOWS\CSRSS.EXE
size: 3.072 bytes
startup:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run "Loader"
Author Information / Description
dSocks4 v1.0 by Drocon
==================================================
To put it short, dSocks4 is a efficient and stealthy
socks4 server coded in ASM. I've myself throughly
tested it without any problems, so you shouldn't
encounter too much problems.
==================================================
Howto?
Each of the options in the Server Builder:
-> Username - This is the authentication "token"
needed to connect to the server, set it to
something unique so your socks servers won't
get stolen
-> Port - Self Explanatory, it's the port the server
starts on
-> Exename - A exe name you choose for the server
-> Reg Key- THe name of the registry Key
Drocon
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.