Follow The Charts - 1
Last updated
Was this helpful?
Last updated
Was this helpful?
We are tasked with downloading the potential malware sample and identifying the MD5 hash.
Once we download the file from Malcolm we use the command md5sum on the file to get the files hash.