An overview of malware hashing algorithms

This article has been indexed from Security Blog G Data Software AG

VirusTotal’s “Basic Properties” tab alone lists eight different hashes and supports even more to use them for queries and hunt signatures. Hashes are important for malware analysis, as well as identification, description and detection. But why do so many of them exist and when should you use which hash function?

Read the original article: An overview of malware hashing algorithms