Archive Helmet Icon Archive A Reconstructed © MegaSecurity Database

Nuclear Rootkit

Released 20 years, 4 months ago. December 2005

Copyright © MegaSecurity

By Princeali


Nuclear Rootkit
Informations
Author Princeali
Family Nuclear Rootkit
Category Remote Access
Version Nuclear Rootkit
Released Date Dec 2005, 20 years, 4 months ago.
Additional Information
dropped files:
c:\WINDOWS\nkit.dll       Size: 44,544 bytes 
c:\WINDOWS\Rootkit.exe    Size: 27,648 bytes 

startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion "shitbit"
data: SOFTWARE\Microsoft\Windows\CurrentVersion\Run 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "hello"
data: C:\WINDOWS\Rootkit.exe 

tested on Windows XP
December 31, 2005

Author Information / Description
Nuclear Rootkit 1.0

Introduction 
This rootkit perfom a user level Hook on Certain APIs , allowing you to Hide or modify some items on the NT Based OS (NT/2000/Xp/2k3) .

Features 
*Process Hiding
*Files / Dirs Hiding
*Registry keys Hiding
*Connection in Netstat hiding
*Modules (dll) Hiding
*Application Block
*Connection Block
*Persistence (Undeletable , Unrenamable , Unmovable)

Usage
* Add the Files Names / Reg keys / Ports ect ... to the list in the Section you want and Click the Create Button.
* To Check if The Rootkit is Already Running on you , Click Check Result .
*You Can Save / load your Settings any time using Load Script / Save Script in the Context menu , I included a sample script called 
samplescript.nsf you can load it directly in the rootkit editor .

Benefits / Hints

Process
Hide Process(s) totally from the task manager.

Hint : Add Exact processes name for example (notepad.exe)

File/Dir
Hide Directory(s) or File(s) from windows explorer.

Hint : Add Exact File or Directory Name for example (notepad.exe � Ali)

Registry
Hide Registry Value(s) from the registry editor and MSConfig.

Hint : Add Exact Registry Strings for example (hello)


Ports
Hide connections on / though any port(s) in netstat.

Hint : Add Ports and Protocols , for example (80 � http � smtp � 25 ect�)


Modules
Hide Modules in specific processes from any module explorer.

Hint : Add the Process Name then the module name , please note that
       Some firewalls might block network access to the process u 
       Have chosen to hide a module in it .

Application Block
Block explorer from executing a list of applications

Hint : Add Exact file name for example (file.exe)


Connection Block
Block applications from connecting to anything 

Hint : Add Exact processes name for example (iexplore.exe)


Persistence 
Protect Directory(s) or File(s) from being deleted / renamed / moved 

Hint : Add Exact processes name for example (notepad.exe , Directory ,ect�)
 

Credits 
afxcodehook - aphex
peb  - erazer

Princeali

This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.