Archive Helmet Icon Archive A Reconstructed © MegaSecurity Database

TX

Released 21 years, 11 months ago. May 2004

Copyright © MegaSecurity

By Goldie


Informations
Author Goldie
Family TX
Category Remote Access
Version TX
Released Date May 2004, 21 years, 11 months ago.
Language Visual C++
Additional Information
TX:
size: 924 bytes

port: 8080 TCP

startup:
none

Author Information / Description
Description
---=====---

The Smallest VC++ Coded Universal Windows Backdoor for all versions of Windows NT/2K/XP/2003 with any service pack.
But not for Windows 98/ME! since Microsoft stopped the support for them, i can't code for an unsupport Operating
system. :)) A Tini, Small, Petite app that listen on a fixed port and creates a command shell when it receives
a connection.

Default port of listening is : 8080


Working
--===--

Just run it. It listens on Port 8080. Currently it is hardcoded in the program to keep the size to the minumum.
But if you want you can change it at the exe.


Usage
--=--

Use netcat to connect to the ip address where the program is listening at port 8080. Voila! You end up in Cmd Shell.
Then what else?. Enjoy your stay!. You can delete the Tx after you have been dropped on to the shell. 
The process will exit automatically. The only connection between you & the target machine will through the cmd.exe.

Rest you can figure it out. :)


A small how to change port description!
---=================================---

Use the port in htons() format. Convert it to hex, swap it to write it to exe using hex editor.

For example, if you want the program to listen on 3278 in-stead of 8080, htons(3278) = 52748 in decimal
Convert it to hex = CE0C

Now use the hex editor open the Tx.exe, search for 1F90 replace it with 0CCE. 
Remember to swap the after hex conversion.

Goldie

This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.