Archive Helmet Icon Archive A Reconstructed © MegaSecurity Database

FileHack

Copyright © MegaSecurity

By akosch


FileHack
Informations
From Germany
Author akosch
Family FileHack
Category Remote Access
Version FileHack
Language Delphi
Additional Information
Client:
port: 1986, 2004 TCP



Server: Server.html 

remark:
Used  method:
Microsoft Internet Explorer (unpatched) contains a vulnerability that can allow script code 
within an HTML document to run an embedded executable file. Since the file is an HTML file,
Internet Explorer will open and parse the file. When the script that points back 
to the embedded executable is parsed, the embedded executable will run on the client
system in the security context of Internet Explorer. 
(Securityfocus)

This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.