Cybersecurity Fundamentals - Prove

I tried everything and still not getting right. Any help would be appreciated-


After running the .sh file, it says that the First rule is right. Is there something wrong in 2nd rule?


This is what Windows Defender shows after I extract Sample2 file and place the malware in Windows Folder. The placeholder given under the question was different from what is shown above in the image.

Thanks in advance

On the second rule, try “<>” instead of “->”. For the defender question, I think Microsoft has changed how they classify Sample2. Try Win32/Andromeda!ic

1 Like

Thanks a lot. This worked :smile: