App Control: How to Create a Malicious Test File (EICAR)
search cancel

App Control: How to Create a Malicious Test File (EICAR)


Article ID: 285988


Updated On:


Carbon Black App Control (formerly Cb Protection) Carbon Black Cloud Endpoint Standard (formerly Cb Defense) Carbon Black Cloud Enterprise EDR (formerly Cb Threathunter) Carbon Black EDR (formerly Cb Response) Carbon Black Hosted EDR (formerly Cb Response Cloud)


Explain how to create a malicious test file (EICAR) for testing purposes in a lab environment


  • App Control: All Supported Versions


  • Open a text editor, such as notepad.
  • Copy/paste the string below. Do not add any other characters, spaces, or return marks in the text file. Additional values will generate a different hash and your test file will not be effective
  • Save the document as File extension will have to be .com for App Control to analyze the file

Additional Information

Hashes of

SHA-256: 275A021BBFB6489E54D471899F7DB9D1663FC695EC2FE2A2C4538AABF651FD0F  

MD5: 44D88612FEA8A8F36DE82E1278ABB02F 

SHA-1: 3395856CE81F2B7382DEE72602F798B642F14140