Archive A Reconstructed © MegaSecurity Database
Mail Shtirlitz
Released 27 years, 3 months ago. January 1999
Copyright © MegaSecurity
By General Failure
Informations
| From | Russia |
| Author | General Failure |
| Family | Mail Shtirlitz |
| Category | Information Stealer |
| Version | Mail Shtirlitz |
| Released Date | Jan 1999, 27 years, 3 months ago. |
| Language | Delphi |
Additional Information
Server:
c:\windows\Spool64.exe
size: 27 KB
startup:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run "TSpool"
Author Information / Description
Shtirlitz 2.17 from General Failure
--------------------------------------
Shtirlitz can send victim's passwords and other stuff entered in
windows with "secret field" (e.g. "Passwords: *******") to
your email. Shtirlitz consists of 2 files:
MSTConfig.exe --- configurator program
shtirlitz.exe --- trojan (should be sent to victim after configurating).
You may configurate shtirlitz.exe to your email and needed SMTP server
through which mail be sent (you may use default)... Run MSTConfig.exe
and press "Open EXE...", then open shtirlitz.exe and enter in the field
"EMail Addr" your email address (I may use your real own mail box -
nobody will see it, it'll be encoded in shtirlitz.exe), connect to internet,
enter SMTP server's hostname and press "Lookup IP" - IP address of SMTP
server will appear instead of hostname (you may write IP if you know and
don't connect to Internet to look it up). Then press "Save data", "Quit".
Now your Shtirlitz.exe is configured. You may rename it and send to victim.
Please, don't try to attach Shtirlitz to any executable file - it won't work! :(
version 2.17 doesn't allow to attach to exe files with for example SilkRope.
You may rename shtirlitz exe to any name you like.
Once infected victim's windows will allway run Shtirlitz and it'll try every
3 minutes to connect to SMTP server and send detected passwords (method of
detection is the same as in GF) to your email.
Good luck!
GF.
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.