Malware Unicorn

twitter: @malwareunicorn
Company: Endgame, Inc.
MU

View My GitHub Profile

Go Back to Reverse Engineering Malware 102

Section 1: Setup

Environment Setup

If you haven’t already, please take the RE101 course. The environment setup is the same. Please refer to this page Section 1: Fundamentals


Download the Unknown Malware

HERE

Password is “infected”

Sha1 for zip file

f77f58812d5883775e59dfe952239d7dddfbd332

Sha256 Malware inside

8be8abab0f3ebcc18e7b8b3c437feb073fa7b9b30e8b1eef81451f0938b2a52a

WARNING - DO NOT UNZIP OR RUN THIS OUTSIDE OF A NETWORK ISOLATED VM

  1. Run the Victim VM and copy over the malware.zip into the VM.
  2. Unzip Warning - DO NOT UNZIP THIS OUTSIDE OF THE VM
Intro <- Back Next -> Information Gathering