- Apr 9, 2020
- 667
VirusTotal's "Basic Properties" tab alone lists eight different hashes and supports even more to use them for queries and hunt signatures. Hashes are important for malware analysis, as well as identification, description and detection. But why do so many of them exist and when should you use which hash function?

All your hashes are belong to us
Hashes are important for malware analysis, as well as identification, description and detection. But why do so many of them exist and when should you use which hash function? Karsten shines a light on this question for you.

Covered topics:
- Cryptographic hashes: MD5, SHA-1, SHA-256
- Fuzzy Hashes: dcfldd, ssdeep, TLSH, mvHash-B
- Control Flow Graph hashing: Machoc and Machoke
- Import hashing: ImpHash, TypeRefHash and ImpFuzzy
- Human readable hash: Humanhash
- Image similarity: aHash, pHash, dHash
- Digital certificates: Authentihash
- Rich PE Header hashes: Rich, RichPV