struppigel Super Moderator Thread author Verified Staff Member Well-known Forum Veteran Apr 9, 2020 666 5,865 1,280 Germany Apr 14, 2021 #1 Content source https://www.youtube.com/watch?v=fWV8Dh_RBZU The imphash or import hash by Mandiant has been widely adopted by malware databases, security software and PE tools. What is it used for? How does it work? And can it be improved? Spoiler: Video Reactions: Mercenary, JoeN, Venustus and 5 others
The imphash or import hash by Mandiant has been widely adopted by malware databases, security software and PE tools. What is it used for? How does it work? And can it be improved? Spoiler: Video