Archive Helmet Icon Archive A Reconstructed © MegaSecurity Database

PassWord Ripper

Released 21 years, 4 months ago. December 2004

Copyright © MegaSecurity

By (v)aster


PassWord Ripper
Informations
Author (v)aster
Family PassWord Ripper
Category Information Stealer
Version PassWord Ripper
Released Date Dec 2004, 21 years, 4 months ago.
Language Delphi, Source included
Additional Information
Server:
dropped file:
c:\WINDOWS\WinDialog32.exe
size: 50,176 bytes 

startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "WinDialog"
data: C:\WINDOWS\WinDialog32.exe 



tested on Windows XP
February 19, 2005

Author Information / Description
The Password Ripper ripps passwords from 
ICQ 2003b, InternetExplorer\Outlook 
and Cached Passwords from Windows 9x\ME
Firewall bypass
--------------------------------------------

Server is not Packed with any packer, so you can use some Packers
Settings are Crypted in Server, so that noone can read them ;)
You can select which passwords you want to be uploaded
to your FTP Server [ Server Size will not be changed ! ]
You can select if you want that the Server load everytime Windows start.

Server without Firewall bypass is ~49kb not packed
Server with Firewall bypass is ~80kb not packed

Firewall bypass:
  if you select iexplore.exe then its inject into iexplore.exe
  and its use iexplore service for uploading,
  if you select firefox.exe then its inject into firefox.exe
  and its use firefox service for uploading, same with opera
  just when you don't use injecting then its use iexplore as service
  for uploading :D
  Injecting works on Win9x\ME\XP fine

--------------------------------------------

1. You need to get FTP Server
2. Add your Settings into the Builder, and click Build. [ You need write-rights on ftp ]
3. Send your Victim :D
4. Connect to your FTP Server, Login, check if file* is there, download file

* = File is in the Root folder of the FTP Server
 
--------------------------------------------


cya (v)aster

This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.