https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html
One unique way that Mandiant tracks specific threat groups' backdoors is to track portable executable (PE) imports. Imports are the functions that a piece of software (in this case, the backdoor) calls from other files (typically various DLLs that provide functionality to the Windows operating system). To track these imports, Mandiant creates a hash based on library/API names and their specific order within the executable. We refer to this convention as an "imphash" (for "import hash"). Because of the way a PE's import table is generated (and therefore how its imphash is calculated), we can use the imphash value to identify related malware samples. We can also use it to search for new, similar samples that the same threat group may have created and used.
Subscribe to:
Post Comments (Atom)
How to Supercharge Your Python Classes with Class Methods
How to Supercharge Your Python Classes with Class Methods | by Siavash Yasini | May, 2024 | Towards Data Science As we just mentioned, a c...
-
https://rszalski.github.io/magicmethods/ __init__ __repr__ __getattr__ __setattr__ __call__(self, [args...]) context manager class Closer: ...
-
What is a Generalised Additive Model? What are Generalised Additive Models? | Towards Data Science 5.3 GLM, GAM and more | Interpretable M...
-
Five basic elements about reinforcement learning: agent, state, environment, policy, reward. Here is an example https://builtin.com/data-...
-
Use Celery Celery is an asynchronous task queue based on distributed message passing to distribute workload across machines or threads. A c...
-
• ENERGY CONSUMPTION https:// www.drivendata.org /competitions/51/electricity-prediction-machine-learning/page/101/ • TAXI ROUTE ...
No comments:
Post a Comment