Archive Helmet Icon Archive A Reconstructed © MegaSecurity Database

RMF_FN

Released 26 years ago. April 2000

Copyright © MegaSecurity

By ZENEK


RMF_FN
Informations
From Poland
Author ZENEK
Family RMF_FN
Category Remote Access
Version RMF_FN
Released Date Apr 2000, 26 years ago.
Language Delphi
Additional Information
Server:
C:\WINDOWS\SYSTEM\OLE32.EXE 

size: 212.732 bytes

port: 8888 TCP

startup:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run "OleLoader"

Author Information / Description
R M F _ F M B A C K D O O R    V E R S I O N 1 . 1    B E T A    III


---------------------------------------- N O T E ------------------------------------------------

                                   For educational only

---------------------------------------- N O T E ------------------------------------------------



1. Introduction
	RMF_BACKDOOR V1.1 BIII is a trojan horse with GUI (Graphical User Interface)
   It makes possible full control infected computer.
   This trojan was written under DELPHI 5.0 PROFESSIONAL.

2. How to infect computer
	To infect computer you must execute SETUP.EXE which is working under WIN 95/8
        (Windows 2000 not tested yet). Executed server is being copied into WINDOWS/SYSTEM
        directory (typical C:\WINDOWS\SYSTEM) then it's modifing registry (adds path to SETUP.EXE
        in /RUN section).Server exectes while WINDOWS is starting.

3. Features
   - IP Scanning  //Built-in IP scanner
   - Visual tricks //Built-in screen-saver
   - Access to disks (downloading and executing)
   - Screen grabbing //Built-in viewer

4. RMF.ZIP includes
   - RMF.EXE    //Trojan client
   - SETUP.EXE  //Trojan server
   - README.TXT //This file
   - SOURCE.ZIP //Full source code

5. Source code modifications
	Modifications are advisable but don't modify trojan name and "About"  section in
   client  - PLEASE


RMF_FM is registred trademark of RADIO MUZYKA FAKTY LTD. //Best polish radio

Copyright (C) by ZENEK

This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.