Jump to content
Tuts 4 You


Popular Content

Showing content with the highest reputation on 05/26/2020 in all areas

  1. 1 point
    File hashes are only used to get/recognize a sample that is already know. You can't really do the same with a mutex as there is probably tons of files having the same mutex already and they can be also generated on the fly by the malware so it would be unreliable 'alone'. If you know already the hash of a file (sha256 preferably) then you don't need more. Mutexes are only good to find new similar samples, but once again you need to couple that with some other indicators, otherwise you will get many false positives if you rely only on that.
  2. 1 point
    here is my production of face shields, already 200 dispatched around my town to local hospital, liberal nurses, etc...
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up
  • Create New...