Appendix
Sample Names and Corresponding SHA1 Hashes
The following are the real-life malware samples used in the book's walk-throughs and exercises. They are live malware and may cause damage to your computer, if not properly handled. Please exercise caution in storing and analyzing them.
Reference Name | SHA1 |
Sample A | 092e149933584f3e81619454cbd2f404595b9f42 |
Sample B | bee8225c48b07f35774cb80e6ce2cdfa4cf7e5fb |
Sample C | d6e45e5b4bd2c963cf16b40e17cdd7676d886a8a |
Sample D | 2542ba0e808267f3c35372954ef552fd54859063 |
Sample E | 0e67827e591c77da08b6207f550e476c8c166c98 |
Sample F | 086b05814b9539a6a31622ea1c9f626ba323ef6d |
Sample G | 531971827c3b8e7b0463170352e677d69f19e649 |
Sample H | cb3b2403e1d777c250210d4ed4567cb527cab0f4 |
Sample I | 5991d8f4de7127cfc34840f1dbca2d4a8a6f6edf |
Sample J | 70cb0b4b8e60dfed949a319a9375fac44168ccbb |
Sample K | 23fffc74cf7737a24a5150fab4768f0d59ca2a5c |
Sample L | 7679d1aa1f957e4afab97bd0c24c6ae81e23597e |
Get Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.