Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Crowdstriker 970×120
When Malware Hides in Videos! The PixelCode Technique Breaks the Rules

When Malware Hides in Videos! The PixelCode Technique Breaks the Rules

26 January 2026 09:12

PixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into pixel data, transforming each byte into a color structure. The technique completely changes the way we think about graphics and video files, viewing them as potential vectors of binary data without exposing their actual content.

The underlying concept is simple in idea, but complex in implementation: converting an executable program into a visual map .

This “pixel code” can then be stored inside an image or video, making it seemingly harmless to traditional scanning tools that do not analyze visual content for executable data.

How the technique works

The project documents a multi-step process. The first involves a C++ payload designed for command and control communications, compiled into a standard executable. This executable is not distributed as is, but converted into an MP4 video using a dedicated Python tool.

Once the video is generated with the “Pixel Code,” it can be uploaded to public platforms such as video sharing services. The playlist thus hosts a seemingly innocuous file, a random video, which actually contains binary data ready to be extracted.

The next step uses a C++ loader that includes the video URL . This loader, when run on a system, downloads the video and calls a small Python stager, also embedded in the loader, to convert the pixels back to the original bytes.

Implications and reflections

This technique opens up unusual scenarios: media files uploaded to trusted services can be used to transport data that eludes traditional security filters , which tend to focus on EXEs or explicit scripts. The underlying idea is that videos aren’t subject to the same rigorous scanning as binary files.

Running the reconstructed payload in memory prevents potentially suspicious files from being written to disk, making detection and removal difficult by antivirus or behavior detection systems.

This project is not a real attack but a demonstration of research and awareness, used to highlight how unconventional techniques can be exploited for code delivery.

Towards the end of the paper, the authors emphasize that the technique is for educational and research purposes only, and should not be used in ways that violate any laws – and this is where S3N4T0R-0X0/Malicious-PixelCode comes in as an example of advanced research.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella. Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.