Embed Malware in Alternative Data Streams

Поділитися
Вставка
  • Опубліковано 1 жов 2024
  • Hey Hackers!
    MalwareDNA: github.com/Cos...
    I hope you enjoyed the video. If you have any questions make sure to leave them in a comment down below. You can also contact me through my website on the "Contact and Information" page or on my discord server.
    Want to support CCS?:
    Happy Hacker: cosmodiumcs.co...
    GoFundMe: www.gofundme.c...
    Socials:
    Website: cosmodiumcs.com
    Instagram: / cosmodium.cs
    GitHub: github.com/Cos...
    Discord: / discord
    Make sure to like and subscribe!
    Happy Hacking!

КОМЕНТАРІ • 35

  • @Counterhackingsafe
    @Counterhackingsafe Рік тому +2

    Awesome 👏 thank you for this walkthrough I definitely trying it out.

  • @smoggy6270
    @smoggy6270 Рік тому +3

    hi mate i'm just starting in this world and i don't know wich pc buy, what are your pc components?, and which pc would you recommend me to buy?. thanks for sharing this interesting videos

    • @CosmodiumCS
      @CosmodiumCS  Рік тому +3

      Yeah ofc! I honestly just have a laptop and a mic lol. I don’t even have an external keyboard atm XD. But honestly get something with decent storage 256GB -1Tb), a modern CPU, and RAM (8gb minimum). If ur gonna do a weirdly large amount of password cracking (or gaming) then get a good graphics card but most will suffice.
      My components:
      32gb ram
      1tb storage
      11th gen intel i7
      Intel Iris Xe graphics card

    • @smoggy6270
      @smoggy6270 Рік тому +1

      @@CosmodiumCS thank you bro!!! greetings from México

  • @n0tt_sec
    @n0tt_sec Рік тому +2

    I'm a little late to the party, but this and your video on shortcutting malware on USBs work very well together. Especially since this wont show even if people have their pc set to show hidden files/folders.

    • @CosmodiumCS
      @CosmodiumCS  Рік тому +2

      i don't know why this never crossed my mind hhahaa! epic 🔥

  • @igornemorssa2936
    @igornemorssa2936 Рік тому +1

    This techique stop working. Syntax is incorrect

    • @kazekazuo
      @kazekazuo Рік тому

      Why?

    • @redax101
      @redax101 7 місяців тому

      This only worked for me when using cmd instead of Powershell

  • @ZacLangston
    @ZacLangston Рік тому +1

    This is so cool. Qustion would an AV be able to detect this say if it was in a folder with another .exe that run the alternate stream .exe?

    • @CosmodiumCS
      @CosmodiumCS  Рік тому

      Yeah that’ll likely work, AV will be more concerned about the main exe then it would be for the ads exe.

    • @ZacLangston
      @ZacLangston Рік тому

      @@CosmodiumCS wow this is so cool

  • @menatic4577
    @menatic4577 Рік тому +1

    Cosmos taking this game on a different level. Got a lot out of this video. Been playing around with some Rust recently, what do you make of Rust for mal dev or offsec in general?

    • @CosmodiumCS
      @CosmodiumCS  Рік тому

      I genuinely think it’s a great language with a lot of needed capabilities. New languages for malware are great because AV has not yet recognized its compilation signatures. However, there’s a “new” language every year. Rust, Go, carbon, nim, most recently “zig”. These languages have not yet hardened and likely have numerous vulnerabilities that will need to be patched down the road. We saw this with java and log4shell. C/C++ have been out for decades and have had years of tweaks and fixes. I will probably learn rust later this year but i do have concerns about new languages in the wild. Hopefully them being out in the wild gives them the opportunity to harden :)

    • @menatic4577
      @menatic4577 Рік тому +1

      @@CosmodiumCS Mate trust me Rust is alot safer than C and C++ when it comes to security or vulnerabilites. Rusts number 1 priorty has always been safety otherwise it wont let you even build an executable. Its got numerous amount of security mechanisms and things like buffer-overflow attacks are out of the question in RUST. Its also got the cargo feature which is much more convieniant to download external libraries comparitively to C and C++. I think you should defo give it a go.

    • @CosmodiumCS
      @CosmodiumCS  Рік тому +1

      @@menatic4577 oh bet! I didn’t know too much about it. I’ll def give it a shot🔥. May be time to learn another language 😭

    • @Skyler2249
      @Skyler2249 Рік тому

      @@CosmodiumCS thats true, rust is the most secure of all programming languages.

  • @gameboyv1790
    @gameboyv1790 Рік тому +1

    hey

  • @QusarWilson
    @QusarWilson 11 місяців тому

    Cosmodium Bro!!! Love your work man. Your explanations are easy to grasp and experiment. New Sub activated. Quick suggestion Cosmodium bro, could you do AV and *DR evasions?

    • @CosmodiumCS
      @CosmodiumCS  11 місяців тому

      Great suggestion! I will def pull some of that content together. Appreciate the kind words :D

  • @css2165
    @css2165 Рік тому

    i have a question. if you remotely host this malware through tcp and a victim downloads the ads.png file, does it automatically get all the alternate data streams, or are those completely seperated from the actual file?

    • @CosmodiumCS
      @CosmodiumCS  Рік тому

      I think I mentioned this in the video but u usually need to zip it in order to pull down the ads. Unless if u host it on an ntfs and not ext4, u may not have to zip it. (But i would try and see)

    • @css2165
      @css2165 Рік тому

      ​@@CosmodiumCS thanks

  • @NoName-ik7du
    @NoName-ik7du 5 місяців тому

    Is there a way to execute hidden payload in ads? It seems like the whole purpose of this techique is kinda usles, since you would need an separate file that will execute payload in ads. Great tutorial tho! 😊

    • @CosmodiumCS
      @CosmodiumCS  5 місяців тому +1

      Hey! I would definitely not say it’s “useless”. It’s a fairly common side channeling technique, especially for hiding and spreading malware on a system. Yes..u do need a separate payload to execute, but like most malware, having this stager is a lot less inconspicuous than directly running the malware

  • @Echownz
    @Echownz Рік тому +1

    Great tutorial!
    Is is basically steganography?

    • @CosmodiumCS
      @CosmodiumCS  Рік тому +1

      Thank ya! But no it is not steg. Steg is to embed the malware in the file or its metadata. ADS is connected to the file, but not in it. ADS could be considered to be in the same category but the embedded payload can only exist on the ntfs file system. if you were to load the ads.png with all the embedded files on to a linux machine, the data streams would be wiped (unless u zipped it)

    • @Echownz
      @Echownz Рік тому +1

      @@CosmodiumCS ohh I see, I was asking because I'm working on malwares detection in WAV file and steganography, just asked on the discord server about that because there's a lack of info about malwares in audio files

    • @CosmodiumCS
      @CosmodiumCS  Рік тому +1

      @@Echownz OHH WASSUP DEFALT! I never know the connections between the discords and the YT’s. You been watching for a while lmfaoo. But yeah there isn’t too much about WAV file ransomware. I’ll be making a video on polyglot files soon. Could probably help with your project 🔥💯

    • @Echownz
      @Echownz Рік тому +1

      @@CosmodiumCS yeah LMAO the usernames doesn't match but finally you got it ;)

  • @PraveenKumar-mm1br
    @PraveenKumar-mm1br Рік тому

    What happened to your python C2 project? Did you discontinue it?

    • @CosmodiumCS
      @CosmodiumCS  Рік тому

      Yes, because i made it better👀. Vid on it soon!

  • @igornemorssa2936
    @igornemorssa2936 Рік тому

    Excelent tutorials 💯💥 Plese continue with this metods 👍👍