Archive A Reconstructed © MegaSecurity Database
TX
Released 21 years, 11 months ago. May 2004
Copyright © MegaSecurity
By Goldie
Informations
| Author | Goldie |
| Family | TX |
| Category | Remote Access |
| Version | TX |
| Released Date | May 2004, 21 years, 11 months ago. |
| Language | Visual C++ |
Additional Information
TX:
size: 924 bytes
port: 8080 TCP
startup:
none
Author Information / Description
Description
---=====---
The Smallest VC++ Coded Universal Windows Backdoor for all versions of Windows NT/2K/XP/2003 with any service pack.
But not for Windows 98/ME! since Microsoft stopped the support for them, i can't code for an unsupport Operating
system. :)) A Tini, Small, Petite app that listen on a fixed port and creates a command shell when it receives
a connection.
Default port of listening is : 8080
Working
--===--
Just run it. It listens on Port 8080. Currently it is hardcoded in the program to keep the size to the minumum.
But if you want you can change it at the exe.
Usage
--=--
Use netcat to connect to the ip address where the program is listening at port 8080. Voila! You end up in Cmd Shell.
Then what else?. Enjoy your stay!. You can delete the Tx after you have been dropped on to the shell.
The process will exit automatically. The only connection between you & the target machine will through the cmd.exe.
Rest you can figure it out. :)
A small how to change port description!
---=================================---
Use the port in htons() format. Convert it to hex, swap it to write it to exe using hex editor.
For example, if you want the program to listen on 3278 in-stead of 8080, htons(3278) = 52748 in decimal
Convert it to hex = CE0C
Now use the hex editor open the Tx.exe, search for 1F90 replace it with 0CCE.
Remember to swap the after hex conversion.
Goldie
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.