: Using the strings command reveals interesting artifacts:
: Lab01-01.exe (standard for this hash in the PMA labs). MD5 Hash : DE46DB7A50EBF97E7D7CA72B46E757E69 . Compile Time : Checking the PEcap P cap E Download File DE46DB7A50EBF97E7D7CA72B46E757E69...
kerne132.dll : A common "typosquatting" trick where the malware creates a file named with a '1' instead of an 'l' to hide in the System32 directory. : Using the strings command reveals interesting artifacts: