Sample Names and Corresponding SHA1 Hashes - Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (2014)

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (2014)

Appendix. Sample Names and Corresponding SHA1 Hashes

The following are the real-life malware samples used in the book's walk-throughs and exercises. They are live malware and may cause damage to your computer, if not properly handled. Please exercise caution in storing and analyzing them.

Reference Name

SHA1

Sample A

092e149933584f3e81619454cbd2f404595b9f42

Sample B

bee8225c48b07f35774cb80e6ce2cdfa4cf7e5fb

Sample C

d6e45e5b4bd2c963cf16b40e17cdd7676d886a8a

Sample D

2542ba0e808267f3c35372954ef552fd54859063

Sample E

0e67827e591c77da08b6207f550e476c8c166c98

Sample F

086b05814b9539a6a31622ea1c9f626ba323ef6d

Sample G

531971827c3b8e7b0463170352e677d69f19e649

Sample H

cb3b2403e1d777c250210d4ed4567cb527cab0f4

Sample I

5991d8f4de7127cfc34840f1dbca2d4a8a6f6edf

Sample J

70cb0b4b8e60dfed949a319a9375fac44168ccbb

Sample K

23fffc74cf7737a24a5150fab4768f0d59ca2a5c

Sample L

7679d1aa1f957e4afab97bd0c24c6ae81e23597e