EICAR Samples created to test the Anti-virus scanner scenario as part of web portal penetration testing.
1.Downlaod the file "EICAR_Samples (Win-L2) (16 Files).zip"
2.Extract the file "EICAR_Samples (Windows) (16 Files).docx" from the above zip file using password pass1234
3.Rename the file extension from "EICAR_Samples (Windows) (16 Files).docx" to "EICAR_Samples (Windows) (16 Files).ZIP"
4.Extract all the files in the "EICAR_Samples (Windows) (16 Files).ZIP" file using password pass1234
EICAR_Samples (Win-L2) (16 Files).zip: EA7C115E78B93D614FAD6919BEBD8AD585F4C536A796859468D889033F8F15A6
EICAR_Samples (Windows) (16 Files){.zip/.docx}: C95BB5BDB7EAAEC22FFEFA560B0B62FEAA4DC2997E58C206A40F7E8BF137C706
1.Attached binary is protected with password (2 levels) to avoid the Anti-Virus detection when you download from GitHub or while you copy the files from internet connected device to your pentest server.
2.You will need a whitelisted location from your local AV scanner, otherwise the file may get detected when you try to extract from zip file.
3.File needs to be extracted before testing the web portal. Files starts with eicar_test_*
are the actual files to test your web portal against AV scan.