Online Courses
Malware Analysis
Online Courses
Malware Analysis
  • Malware Analysis Bootcamp
  • What is Malware Analysis ?
  • Setting Up Our Environment
  • Static Analysis
  • File Type Identification
  • Generating Malware Hashes
  • Extracting Strings
  • Packers & Unpacking
  • Understanding The PE Header
    • Analyzing
  • Examining The Resources Section
  • Malware Classification And Identification
    • YARA Rules
Powered by GitBook
On this page
  • Malware Hashing
  • Why Should You Hash ?

Generating Malware Hashes

PreviousFile Type IdentificationNextExtracting Strings

Last updated 2 years ago

Malware Hashing

Malware hashing is the process of generating cryptographic hashes for the file content of the target malware. We are hashing the malware file.

The hashing algorithms used in malware identification are:

  • MD5

  • SHA-1

  • SHA-256

The hashing process gives us a unique digest known as a fingerprint.

This means we can create unique fingerprints for malware samples.

Why Should You Hash ?

For accurate identification of malware samples, rather than using file names for malware. Hashes are unique.

Hashes are used to identify malware on malware analysis sites ().

Hashes can be used to search for any previous detections or for checking online if the sample has been analyzed by other researchers.

Virus Total