Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (2014)
Appendix. Sample Names and Corresponding SHA1 Hashes
The following are the real-life malware samples used in the book's walk-throughs and exercises. They are live malware and may cause damage to your computer, if not properly handled. Please exercise caution in storing and analyzing them.
|
Reference Name |
SHA1 |
|
Sample A |
092e149933584f3e81619454cbd2f404595b9f42 |
|
Sample B |
bee8225c48b07f35774cb80e6ce2cdfa4cf7e5fb |
|
Sample C |
d6e45e5b4bd2c963cf16b40e17cdd7676d886a8a |
|
Sample D |
2542ba0e808267f3c35372954ef552fd54859063 |
|
Sample E |
0e67827e591c77da08b6207f550e476c8c166c98 |
|
Sample F |
086b05814b9539a6a31622ea1c9f626ba323ef6d |
|
Sample G |
531971827c3b8e7b0463170352e677d69f19e649 |
|
Sample H |
cb3b2403e1d777c250210d4ed4567cb527cab0f4 |
|
Sample I |
5991d8f4de7127cfc34840f1dbca2d4a8a6f6edf |
|
Sample J |
70cb0b4b8e60dfed949a319a9375fac44168ccbb |
|
Sample K |
23fffc74cf7737a24a5150fab4768f0d59ca2a5c |
|
Sample L |
7679d1aa1f957e4afab97bd0c24c6ae81e23597e |
All materials on the site are licensed Creative Commons Attribution-Sharealike 3.0 Unported CC BY-SA 3.0 & GNU Free Documentation License (GFDL)
If you are the copyright holder of any material contained on our site and intend to remove it, please contact our site administrator for approval.
© 2016-2025 All site design rights belong to S.Y.A.