Archive A Reconstructed © MegaSecurity Database
Packet Rat
Released 21 years, 11 months ago. May 2004
Copyright © MegaSecurity
By Ghost
Informations
| Author | Ghost |
| Family | Packet Rat |
| Category | Information Stealer |
| Version | Packet Rat |
| Released Date | May 2004, 21 years, 11 months ago. |
| Language | Visual Basic |
Additional Information
Server:
size: 108.032 bytes
startup:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run "General"
Author Information / Description
Commands:
aim(remove) - Uninstalls Packet Rat from the victims computer.
aim(passwords) - Asks the bot to reply with the users saved names/encrypted passwords.
-------------------------------------------------------------------------------------------
How to use Packet Rat:
Step-by-step
1. Open Editor.exe, and load server.exe into Editor.exe (Do not open server.exe)
2. Fill in your bots username/password, and your screenname. Name your file.
3. After filling in all your information, save the file. (It will be saved to the Packet Rat folder)
4. Now, send the file you created to your victim using AIM, or e-mail, or whatever else.
5. Once your victim executes the server, the bot you specified will login.
6. You may now command your bot.
7. Use SN2REG to add the accounts you have received to your registry or do it manually.
Ghost
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.