ID | C0029 |
Objective(s) | Cryptography |
Related ATT&CK Techniques | None |
Version | 2.0 |
Created | 13 October 2020 |
Last Modified | 31 October 2022 |
Malware may use a cryptographic hash.
Name | ID | Description |
---|---|---|
MD5 | C0029.001 | Malware uses an MD5 hash. |
SHA1 | C0029.002 | Malware uses a SHA-1 hash. |
SHA224 | C0029.004 | Malware uses a SHA-224 hash. |
SHA256 | C0029.003 | Malware uses a SHA-256 hash. |
Snefru | C0029.006 | Malware uses a Snefru hash. |
Tiger | C0029.005 | Malware uses a Tiger hash. |