Skip to content

Latest commit

 

History

History
42 lines (37 loc) · 847 Bytes

cryptographic-hash.md

File metadata and controls

42 lines (37 loc) · 847 Bytes
ID C0029
Objective(s) Cryptography
Related ATT&CK Techniques None
Version 2.0
Created 13 October 2020
Last Modified 31 October 2022

Cryptographic Hash

Malware may use a cryptographic hash.

Methods

Name ID Description
MD5 C0029.001 Malware uses an MD5 hash.
SHA1 C0029.002 Malware uses a SHA-1 hash.
SHA224 C0029.004 Malware uses a SHA-224 hash.
SHA256 C0029.003 Malware uses a SHA-256 hash.
Snefru C0029.006 Malware uses a Snefru hash.
Tiger C0029.005 Malware uses a Tiger hash.