Archive A Reconstructed © MegaSecurity Database
iRcHaTaN - PS 7.1
Released 20 years, 9 months ago. July 2005
Copyright © MegaSecurity
By ?
Informations
| Author | ? |
| Family | iRcHaTaN - PS |
| Category | Information Stealer |
| Version | iRcHaTaN - PS 7.1 |
| Released Date | Jul 2005, 20 years, 9 months ago. |
| Language | Visual Basic |
Additional Information
dropped files:
c:\WINDOWS\netiu1.dll Size: 9,216 bytes
c:\WINDOWS\Spoolsvr.exe Size: 34,343 bytes
c:\WINDOWS\system32\mst32init.exe Size: 34,343 bytes
c:\WINDOWS\system32\netiu1.dll Size: 9,216 bytes
startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} "StubPath"
data: C:\WINDOWS\System32\mst32init.exe
tested on Windows XP
March 16, 2006
Author Information / Description
-------------
iRcHaTaN-PS v 7.1
-------------
** Now Disable GPedit and MsConfig by Check Msconfig Item
Disable Auto Login
Disable RegEdit
Disable System Restore
** Now Send DialUp PassWord ,External Ip Address,Os Name
** Now Send As Email < injection mode > and Fixed PM Bug
** Now Can Open a BackDoor (Listen a Port) to Get Shell From Victim
** Now U Can Bind Server By Another File (As jpg ,exe,txt , ...)
** Now U Can Select Icon
** Now U Can Make a Fake Error For Server
** Auto Update Server in First Logg Off
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.