--- layout: default permalink: /RE102/section1/ title: Setup --- [Go Back to Reverse Engineering Malware 102](https://securedorg.github.io/RE102/) # Section 1: Setup # ## Environment Setup ## If you haven’t already, please take the RE101 course. The environment setup is the same. Please refer to this page [Section 1: Fundamentals](https://securedorg.github.io/RE101/section1/) --- ## Download the Unknown Malware [**HERE**](https://drive.google.com/file/d/0B_0DJl2kuzoNYU9jYldCdmw0d2s/view?usp=sharing) Password is "infected" Sha1 for zip file ``` f77f58812d5883775e59dfe952239d7dddfbd332 ``` Sha256 Malware inside ``` 8be8abab0f3ebcc18e7b8b3c437feb073fa7b9b30e8b1eef81451f0938b2a52a ``` --- # WARNING - DO NOT UNZIP OR RUN THIS OUTSIDE OF A NETWORK ISOLATED VM # 1. Run the Victim VM and copy over the malware.zip into the VM. 2. Unzip **Warning - DO NOT UNZIP THIS OUTSIDE OF THE VM** [Intro <- Back](https://securedorg.github.io/RE102/intro) | [Next -> Information Gathering](https://securedorg.github.io/RE102/section2)