Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (2014)
Appendix. Sample Names and Corresponding SHA1 Hashes
The following are the real-life malware samples used in the book's walk-throughs and exercises. They are live malware and may cause damage to your computer, if not properly handled. Please exercise caution in storing and analyzing them.
Reference Name |
SHA1 |
Sample A |
092e149933584f3e81619454cbd2f404595b9f42 |
Sample B |
bee8225c48b07f35774cb80e6ce2cdfa4cf7e5fb |
Sample C |
d6e45e5b4bd2c963cf16b40e17cdd7676d886a8a |
Sample D |
2542ba0e808267f3c35372954ef552fd54859063 |
Sample E |
0e67827e591c77da08b6207f550e476c8c166c98 |
Sample F |
086b05814b9539a6a31622ea1c9f626ba323ef6d |
Sample G |
531971827c3b8e7b0463170352e677d69f19e649 |
Sample H |
cb3b2403e1d777c250210d4ed4567cb527cab0f4 |
Sample I |
5991d8f4de7127cfc34840f1dbca2d4a8a6f6edf |
Sample J |
70cb0b4b8e60dfed949a319a9375fac44168ccbb |
Sample K |
23fffc74cf7737a24a5150fab4768f0d59ca2a5c |
Sample L |
7679d1aa1f957e4afab97bd0c24c6ae81e23597e |