Archive A Reconstructed © MegaSecurity Database
RBot 1.5
Copyright © MegaSecurity
By ?
Informations
| Author | ? |
| Family | RBot |
| Category | Remote Access |
| Version | RBot 1.5 |
| Language | Microsoft Visual C++, compressed with UPX |
Additional Information
Backdoor.Rbot.15:
dropped file:
c:\WINDOWS\system32\scrgrd.exe
size: 92.672 bytes
port: 113 TCP
startup:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Microsoft Restore"
data: scrgrd.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "Microsoft Restore"
data: scrgrd.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices "Microsoft Restore"
data: scrgrd.exe
changed:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole "EnableDCOM"
old data: Y
new data: N
monitors networks for interesting data packets (i.e. those containing passwords to FTP servers, and e-payment systems such as PayPal etc.)
can be used for DDOS attacks
tested on Windows XP
November 28, 2004
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.