Archive A Reconstructed © MegaSecurity Database
LogIT
Released 21 years, 8 months ago. August 2004
Copyright © MegaSecurity
By s13az3
Informations
| Author | s13az3 |
| Family | LogIT |
| Category | Information Stealer |
| Version | LogIT |
| Released Date | Aug 2004, 21 years, 8 months ago. |
| Language | C++ |
Additional Information
Server:
dropped files:
c:\WINNT\system32\logit.dll Size: 3.584 bytes
c:\WINNT\system32\logit.exe Size: 17.920 bytes
startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "sysmon"
data: c:\winnt\system32\logit.exe
tested on Win2000
Author Information / Description
1. Features
===========
- Very lite server 18kb unpacked
- Logs ANY ASCII keyboard (simplified arabic, chinese, french, german)
- Logs Combination press keys e.g. ¬`¦!"£$%^&*(){}[] GfErSxB
- Solves common problem of erroneous repeated keys e.g. "tttteeeesssstttt"
in ms office would now be "test".
- Email log feature after certain size reached (and user is online)
- logger exe and dll written totally C++ and 100% compatible in all
windows platforms of: 95OSR2/98/98SE/ME/NT/2k/XP/2003
2. Easy Start
=============
- Run "Builder.exe"
- Click "Builder" Tab in menu bar to left
- Choose your settings (or leave as default)
- Click "BUILD SERVER" button
- Choose filename and directory of your server file e.g. "test.exe"
- Send test.exe to the remote computer you want to log keystrokes on
- Execute test.exe ON THE REMOTE COMPUTER (NOT YOUR OWN)
- Keystrokes will now be logged to the "log filename" you specified in
the settings before you built the server. ALL files are in the system
directory. ie "Windows\System" or "Windows\System32"
- Download/Retrieve the log file and view the keystrokes at your leisure
s13az3
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.