How Hackers make Undetectable Malware

Поделиться
HTML-код
  • Опубликовано: 12 янв 2025

Комментарии • 122

  • @TomParker-gu9ez
    @TomParker-gu9ez 3 месяца назад +429

    Very useful (I will forget that in 2 days)

    • @HamedEmine
      @HamedEmine 3 месяца назад +13

      Learn to use stuff like Obsidian :>

    • @petewatson9866
      @petewatson9866 3 месяца назад

      You are the person who moans and bitches if you where to get a virus then complain about how much it is going to cost you to recover and repair. But if you stopped getting wasted on benzos and liquor you might learn something

    • @UNcommonSenseAUS
      @UNcommonSenseAUS 3 месяца назад +8

      2 hrs

    • @UNcommonSenseAUS
      @UNcommonSenseAUS 3 месяца назад +1

      ​@@petewatson9866 projection much ?

    • @Aarush.A.S
      @Aarush.A.S 3 месяца назад +4

      😂😂

  • @speedymemes8127
    @speedymemes8127 3 месяца назад +90

    Obfuscating payloads is so fun. You can do all sorts of things like sleep before execution, pack the malware, inject into another process, etc. Would love to see you cover something like Freeze in the future!

    • @Krullfath
      @Krullfath 3 месяца назад +7

      sleep before execution usually doesn't do shit let's be real here.. I've also come across malware that first checks whether or not any debugging tools are actively on it, and other methods like executing code and checking if it took a little longer than normal, or checking certain things on the machine to try and identify whether or not the code is running inside a VM or sandbox..

    • @keksnino3151
      @keksnino3151 3 месяца назад

      and injection almost always gets detected even if its not malware and just an injector

    • @speedymemes8127
      @speedymemes8127 3 месяца назад +3

      @@Krullfath for sure. It's still a commonly observed practice though. I'd also love to see those methods of obfuscation too. I'm still kind of a newb in this space so I'm trying to learn what I can lol.

    • @beast-forever8725
      @beast-forever8725 4 дня назад

      ​@@Krullfath
      Totally agree with you-'sleep before execution' alone feels pretty outdated and doesn’t hold up against advanced detection methods. But when malware combines it with smart checks, it gets way more effective. Like looking for debugging tools, analyzing execution timing, or detecting sandbox artifacts like unusual disk sizes or VM-specific MAC addresses. I’ve seen examples where malware uses APIs like QueryPerformanceCounter to detect if the system clock has been tampered with, like when sandboxes try speeding up time. And those that wait for user interaction-like mouse movements-are just on another level.
      I’m really interested in working on this topic and trying to deepen my understanding of these techniques. I’ve been looking into advanced stuff like thread freezing or API hammering to bypass detection-it’s like playing chess with defenders. Would love to hear your insights or experiences with these kinds of evasion strategies. If you're open to sharing more, feel free to DM me on Instagram at @gyui39154. Would be awesome to chat about this in detail!

  • @truelies5431
    @truelies5431 3 месяца назад +41

    one of the weirdest things happened to a friend of mine which left me puzzled for ages... long story short my friend actively trades gaming accounts for multiple online games and he's well aware of the tricks scammers they pull on you...BUT this one time a hacker sent him what was supposed to be a picture of account details when he clicked the picture the device froze his accounts on social media got hacked and he's device got wiped clean...i'm aware of images that cause system crash on different mobile devices... but a picture that could pull off all that wizardry in limited time is insane to think about

    • @joaomarcos7199
      @joaomarcos7199 3 месяца назад +7

      i would love to see the pc channel opinion on this. UP

    • @mgjfile
      @mgjfile 3 месяца назад

      Maybe the picture was just the "Trojan horse" used to hide a program that steal browser's infos (info stealer that copy the browser's login tokens) and with that they can access the logged in accounts without the needs of any password🤷

    • @s-x5373
      @s-x5373 3 месяца назад +40

      did your friend had file extension on ?
      sounds ike this image was just .exe

    • @truelies5431
      @truelies5431 3 месяца назад

      @@s-x5373 he was on android... And he knows not to install picture. Apk

    • @truelies5431
      @truelies5431 3 месяца назад

      @@s-x5373 that's why it was driving me crazy... I wanted a smaple but they wiped his device clean and hijacked his social media

  • @jagathrajah
    @jagathrajah 2 месяца назад +2

    Love from Tamil Nadu, India. Keep posting good contents like this.

  • @imZeZoO
    @imZeZoO 3 месяца назад +2

    bro u r a legend can u please create a series on malware analysis for IR and SOC analysts like bigger to intermediate level of malware analysis i would watch every second

  • @SafetyTechOficial
    @SafetyTechOficial 3 месяца назад +28

    PC security channel make a test to see if Avast really detects a ransomware packed that is not In ther datebase basically test the Behavior shield

  • @danielbertram
    @danielbertram 3 месяца назад +6

    Very good video Leo… quick comment if possible try to make the screen bigger it facilitates who is using a mobile to watch

  • @mirroredchaos
    @mirroredchaos 3 месяца назад +35

    sometimes I feel the best antivirus is really just the human brain, and I don't just mean avoiding sus links and that kind of stuff I mean using tools that allows you to see every single thing happening on your computer rather than blindly relying on an antivirus to do that for you.

    • @Bellicosy
      @Bellicosy 3 месяца назад +5

      You're not wrong, but unfortunately not every user has a brain. Or perhaps it would be better to say that they lack the knowledge required and must blindly rely on antivirus. The average user is simply that, average, and likely not skilled enough to comprehend and utilise the tools that go beyond automatically performing a scan or similar action and outputting an answer that must be trusted. If you should happen to know of such a tool that even my Grandma could use and understand, I would be glad to hear of it.

    • @tablettablete186
      @tablettablete186 3 месяца назад +4

      Well, there are zero click vulns

    • @mirroredchaos
      @mirroredchaos 3 месяца назад

      @@tablettablete186 those are very rare thankfully, I don't think human nor antivirus is going to easily find malicious code in something like an image file.

  • @D.von.N
    @D.von.N 3 месяца назад +7

    And for that case I have backups and then backups of the backups, using Windoze and Linux alike. If they get my data I cannot do much about it, but for encrypting my disk, I have clones of my OSs too, so restoration will be rather quick.

  • @MikaelKKarlsson
    @MikaelKKarlsson 3 месяца назад +25

    A great example of how while signature scanning is still an important measure, the real protection of any competent security suite lies in live behavioral analysis.
    For all the AV-deniers out there.

  • @eliotcougar
    @eliotcougar 3 месяца назад +6

    Yes, every time I make my own small python program and want to pack into a single executable, that executable gets flagged by most AV software simply because it's packed...

  • @ardwetha
    @ardwetha 3 месяца назад +8

    Making malware undetected against static checks is quite easy. Load all your suspicious dlls at runtime and obfuscate strings (xor or some modified base64 type)

    • @novianindy887
      @novianindy887 3 месяца назад

      at runtime mean the dll doesnt touch the disk?

    • @ardwetha
      @ardwetha 2 месяца назад

      @@novianindy887 Correct or in case of Malware, that you load certain dlls and get certain addresses at runtime. Lets say you want to open a socket for a remote shell. You can just use the WSA funcrions directly inside your code. In this case your program says "Hey I need this dll" on startup and for that contains all needed function in its import table, which then gets filled out by windows. Its like ordering a menu, the program basically says what it wants and windows provides it. Some AVs check imports of files and flag suspicious one (like a lot of network activity, or certain functions). When you load the Libarys, you use LoadLibary and then receive the pointer to the function via GetProcAddress. This also allows you to "encrypt" strings. This means the functions you use wont show up in the imports of the program, which helps to prevent detections from AVs, because the AV cant see what functions you. The other case is dll injection, where you injct a dll into another process and in this case you try, that the dll never hits the disc, so a Researcher has more fun searching.

  • @cpuuk
    @cpuuk 3 месяца назад +2

    It just so happens we were discussion this very thing today, we were asked approve a proggy that was UPX packed and 3 of the scanners flagged it. And of course we asked ourselves the same question you did as it was 3-4 years old- is it legit packed or dumb hacker.

  • @Erik_Arnqvist
    @Erik_Arnqvist 3 месяца назад +36

    Decent advertisement for Malwarebytes right there

    • @landate1
      @landate1 3 месяца назад +1

      *VBA32

  • @igioz
    @igioz 3 месяца назад

    you have to share malware samples, and give us a quick guide to simulate some PT test
    maybe a good way to improve security

  • @logiciananimal
    @logiciananimal 3 месяца назад

    There is the opposite - some of the engines now detect *discussions* or *inert* shell code. This makes us who do pentesting a bit annoyed.

  • @siliconvalley9347
    @siliconvalley9347 27 дней назад

    So the standard mrt tool on windows is potentially useless ?

  • @Opiumgallery
    @Opiumgallery 3 месяца назад

    Can you do a video on how to remove stealer log malware that stays during full disk format and bios reboot

  • @dzabakwesi2213
    @dzabakwesi2213 3 месяца назад

    Please do you have online course? Thanks

  • @ardianhotii
    @ardianhotii 2 месяца назад

    Did anyone see that commit 24 years ago or yall missed it , like dude did even git existed back then ?

  • @justw4lkbesideme
    @justw4lkbesideme 2 месяца назад

    Many laptop i see full 100% processors activity, even not opening anything, with windows 10 especially, and mostly only use windows defender for antivirus
    Is this malware from laptop producers to kill the machine, so customer have to buy again.?...

  • @velo1337
    @velo1337 3 месяца назад

    whats your tought on tftp server they always get flagged

  • @anasouardini
    @anasouardini 23 дня назад

    The best method I know is making your own Virtual Machine with custom CPU instructions.

  • @teefhennessy
    @teefhennessy 2 месяца назад

    Wouldn't modern EDRs do exactly that? I mean look at what a process does at block it based on unusual behavior?

    • @outlawnation5160
      @outlawnation5160 2 месяца назад

      Yes, the difference between EDR and regular AV

    • @barrywang2402
      @barrywang2402 2 месяца назад

      @@outlawnation5160 actually EDR is passive status doesn’t find out early issues even can bypass it working

  • @SeilingMart
    @SeilingMart 2 месяца назад

    Who remembers the rat when is was still viable?

  • @youchwb6005
    @youchwb6005 3 месяца назад +1

    I need a telescope to work out what you are doing.

    • @igorthelight
      @igorthelight 3 месяца назад

      A 23+" monitor would do the trick

  • @parikshitkumar6485
    @parikshitkumar6485 3 месяца назад

    No cybersecurity channel can compete with the pc security channel. 👌

  • @n-i-n-o
    @n-i-n-o 2 месяца назад +2

    Most of the malware prevents running on virtual machines, so try to change your os to act like a virtualmachine. Most of the time a Sandbox Usernames is enough. 🤫 Happy surfing

  • @fynn2014
    @fynn2014 3 месяца назад

    thanks for the tutorial

  • @LavaKingPG3D
    @LavaKingPG3D 3 месяца назад +5

    Kaspecrsy vs malwarebytes?

    • @maxsecrest
      @maxsecrest 3 месяца назад +6

      Neither are really that great. But definitely go with the one that doesn't have a backdoor built in for for the russian government

    • @Mageroeth
      @Mageroeth 3 месяца назад +14

      Use the one built in for the usa gov instead.

    • @resmanual
      @resmanual 3 месяца назад +3

      ​@@maxsecrestif they aren't great go make an antivirus software yourself

    • @LavaKingPG3D
      @LavaKingPG3D 3 месяца назад

      @resmanual I can make a virus (I'm litterly not joking, I might make a vd on it)

    • @RandomDeforge
      @RandomDeforge 3 месяца назад +8

      @@resmanual what a dumb ass response. there are other options to choose from before one would need to gO mAkE OnE YoUrSeLf.

  • @cledtzV2
    @cledtzV2 2 месяца назад

    llvm goes brr

  • @jeanpepin5869
    @jeanpepin5869 3 месяца назад

    How Microsoft make an undetectable warranty ? By incompetence ;)

  • @guilherme5094
    @guilherme5094 3 месяца назад

    👍Nice!

  • @ImSimplyDavid
    @ImSimplyDavid 3 месяца назад +1

    Nice

  • @koljaanisimov
    @koljaanisimov 3 месяца назад

    ty

  • @hilik3186
    @hilik3186 3 месяца назад

    5:00

  • @youshaaaaaa
    @youshaaaaaa 3 месяца назад

    i was 17 old makeing that bullshit ....

  • @harounepcgam6982
    @harounepcgam6982 3 месяца назад

    ❤❤❤

  • @BD4-ManchesterIsRed
    @BD4-ManchesterIsRed 3 месяца назад +2

    👍

  • @joroc
    @joroc 3 месяца назад

    Só antivírus are just a joke?

    • @truelies5431
      @truelies5431 3 месяца назад

      @@joroc I most day to day basis it's OK... But when you're targeted by highly skilled hacker or group of hackers... Then yes antivirus can't help much

  • @armanis1234
    @armanis1234 3 месяца назад +1

    Still maybe i have 100 malwares on my pc but nothing happen yet 😜 just saying

  • @SIGNABLE7
    @SIGNABLE7 3 месяца назад

    {test test}

  • @iamwitchergeraltofrivia9670
    @iamwitchergeraltofrivia9670 3 месяца назад +1

    HHHhajahahahhahhahh very trash windows

    • @M8gazine
      @M8gazine 2 месяца назад

      erm... windows is epic!!

  • @Edward-c2c
    @Edward-c2c 3 месяца назад +1

    bitdefender so expensive (Turkey)

  • @2alcpvp
    @2alcpvp 2 месяца назад

    ty