Skip to content

EICAR-Samples-(16Files)-v1.0.0

Compare
Choose a tag to compare
@V9Y1nf0S3C V9Y1nf0S3C released this 06 Feb 12:15

EICAR Sample created to test the Anti-malware scanner scenario as part of web portal penetration testing.

Steps to extract (16 Files):
1.Downlaod the file "EICAR_Samples (Win-L2) (16 Files).zip"
2.Extract the file "EICAR_Samples (Windows) (16 Files).docx" from the above zip file using password pass1234
3.Rename the file extension from "EICAR_Samples (Windows) (16 Files).docx" to "EICAR_Samples (Windows) (16 Files).ZIP"
4.Extract all the files in the "EICAR_Samples (Windows) (16 Files).ZIP" file using password pass1234

SHA256 Checksum:
EICAR_Samples (Win-L2) (16 Files).zip: EA7C115E78B93D614FAD6919BEBD8AD585F4C536A796859468D889033F8F15A6
EICAR_Samples (Windows) (16 Files){.zip/.docx}: C95BB5BDB7EAAEC22FFEFA560B0B62FEAA4DC2997E58C206A40F7E8BF137C706

Note:
1.Attached binary is protected with password (2 levels) to avoid the Anti-Virus detection when you download from GitHub or while you copy the files from internet connected device to your pentest server.
2.You will need a whitelisted location from your local AV scanner, otherwise the file may get detected when you try to extract from zip file.
3.File needs to be extracted before testing the web portal. Files starts with eicar_test*_ are the actual files to test your web portal against AV scan.