- Apr 9, 2020
- 667
- Content source
- https://www.youtube.com/watch?v=fWV8Dh_RBZU
The imphash or import hash by Mandiant has been widely adopted by malware databases, security software and PE tools. What is it used for? How does it work? And can it be improved?