Archive A Reconstructed © MegaSecurity Database
Schneckenkorn
Released 24 years, 4 months ago. December 2001
Copyright © MegaSecurity
By Umbra
Informations
| From | Germany |
| Author | Umbra |
| Family | Schneckenkorn |
| Category | Remote Access |
| Version | Schneckenkorn |
| Released Date | Dec 2001, 24 years, 4 months ago. |
Additional Information
Client:
port: 1219 TCP
Server:
dropped file:
C:\WINDOWS\WINSYS32.EXE
size: 556 KB
port: 1218, 1219 TCP
startup:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Author Information / Description
Schneckenkorn V1.0
================================================================================
"Schneckenkorn" is a trojan horse based on TCP/IP.
--------------------------------------------------------------------------------
The server uses port 1218 for communication and port 1219 for file-transfer.
You can test, if there's a server active on your system by using "netstat -a".
To clean up an infected system - use the uninstall feature in the client-program.
Schneckenkorn is able to fight some firewalls:
- Norton Personal Firewall 2001 # tested with version: 2.5.30
- ZoneAlarm # tested with version: 2.1.25
This feature is only BETA - so don't be sure that it will always work !
Important: You mustn't use "Schneckenkorn" for any illegal activities !
Read your local law and stick to it.
It should be possible to encrypt the server-exe-file with tools like AsProtect,
AsPack, etc - this could be a way to use Schneckenkorn even if it is recognized
by the heuristic search engine of an anti-virus program.
Schneckenkorn was developed unter Win98 - it should work on other versions too.
For any direct as well as indirect damages caused by the program itself or it's usage,
the author will not take any responsibility !
I only provide a mean to demonstrate a security hole - you are allowed to use it,
but you also take full responsibility.
The language used in this program could make you think Schneckenkorn was a trojan horse,
only developed to hack other users and cause harm.
In spite of this, I only use such expressions because they are very easy to understand -
this program is only a demonstration of a security hole !!!
A last thought: Don't mess in other user's data - if you use this trojan to fight childporn,
nazi-propaganda and similar shit, I also won't take any responsibility -
but you can be sure to get my respect and THX !!! ;-)
--------------------------------------------------------------------------------
(c) Umbra
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.