{"id":1916,"date":"2021-10-14T11:11:55","date_gmt":"2021-10-14T11:11:55","guid":{"rendered":"\/cybersecurity-blog\/?p=1916"},"modified":"2022-12-21T06:49:02","modified_gmt":"2022-12-21T06:49:02","slug":"how-to-identify-malware-similarities","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/","title":{"rendered":"How to Identify Malware Similarities with Fuzzy Hashing"},"content":{"rendered":"\n<p>Malware authors use a variety of methods to hide their creations from detection and cybersecurity analysts. However, researchers find similar samples by advanced hash algorithms. Today we will tell you how one of these algorithms work and show examples.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why do we need to identify malware similarities?<\/h2>\n\n\n\n<p>In most cases, the existing base or core of malware is reused to create <a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-classification-guide\/\">a new type of malicious program.<\/a> Malware writers don\u2019t bother with the time-consuming design of new and \u201cqualitative\u201d viruses, they usually use already existing samples.<br><\/p>\n\n\n\n<p>The code is used again to :&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>compile it again by another compiler<\/li><li>delete or add some features to it<\/li><li>update some libraries<\/li><li>change the distribution of the code inside of a file (thus, new linkers, packers, obfuscation are applied).<\/li><li>replace server IP addresses where data will be sent and downloaded.<\/li><\/ul>\n\n\n\n<p>The goal of these changes is to reshape malware, so it can stay unrecognizable for a while and infect more machines. Nevertheless, there are methods to detect this kind of repackaging and modifications.<br><\/p>\n\n\n\n<p>These techniques are often used to analyze a big amount of data and find common elements there. Practical use cases of these methods can be found in the Threat Intelligence approach or ANY.RUN\u2019s <a href=\"https:\/\/app.any.run\/submissions\">Public Submission<\/a> section.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A hash function<\/h2>\n\n\n\n<p>In 1940 Hans Peter Luhn from IBM developed systems for data analysis, including data storage, transfer, and search for text information. It resulted in designing \u200b\u200btransformation algorithms and then hashing data to find phone numbers and text. These were the first steps in computer science.<br><\/p>\n\n\n\n<p>Now there is a big number of hash algorithms that are distinguished by their collision resistance, calculation speed, bitterness, and other characteristics.&nbsp;<br><\/p>\n\n\n\n<p>We are used to thinking that hash functions are similar to cryptographic hash functions. This is a common tool that serves for different goals, like:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Authentication<\/li><li>Electronic signature<\/li><li>Malware detection (files, IOCs)<\/li><\/ul>\n\n\n\n<p>Let\u2019s find out how hash algorithms help to fight against malicious objects and documents.&nbsp;<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a hash?<\/h2>\n\n\n\n<p>A cryptographic hash function, also called a hash, is a mathematical transformation that maps data to a bit string with numbers, letters, and a fixed size.&nbsp;<br><\/p>\n\n\n\n<p>A hash is collision resilient, if:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>You can\u2019t restore the input data using a hash.<\/li><li>It\u2019s challenging to get identical hashes from different input data.<\/li><\/ol>\n\n\n\n<p>MD5, SHA-1, and SHA-256 are the most popular cryptographic hash algorithms to detect and attribute malware samples. Not long ago malicious objects were recognized only by signatures (a hash) of the executed file.&nbsp;<br><\/p>\n\n\n\n<p>However, in the modern world, it is not enough just to know the hash of the object as it\u2019s quite a weak<a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\"> indicator of compromise<\/a> (IOC). IOCs are artifacts that are used to detect malware. For example, IOCs can be registry presets, downloaded libraries, IP addresses, used ports, and a URL.&nbsp;<br><\/p>\n\n\n\n<p>Let\u2019s have a look at David Bianco\u2019s Pyramid of Pain. This cybersecurity analyst described the level of IOCs\u2019 difficulty that hackers use during attacks. In one case, if you know the MD5-hash of a malicious file, it is quite easy to detect it in the system. However, it will cause no pain to attackers. They will add one more bit of data to malware and the hash will change. In this scenario, a virus can be altered endlessly and each copy will have a different hash from others.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/6u_aw6WOBinof-ckXPLS4In_hSJJ2VnPgqtjnHlZ1evquhU_Hy3lCNMHPaYF9hFrF9fm2RQyMaE6FJWDXdnzk24aeweYGx6wp_O_XgcgEB4orIKYnazAUR_ixXYZh63x60wiXiBJ\" alt=\"\"\/><\/figure>\n\n\n\n<p>If you deal with numerous malicious samples, it becomes clear that most of them are not original at all. Cybercriminals often borrow or buy the source codes from each other and use them in programs of their own. It\u2019s a common practice when malware appears in the wild, and a lot of fake versions made of available fragments come up.&nbsp;<br><\/p>\n\n\n\n<p>How to identify similarities of different malware samples of one family? There are special algorithms of hash calculation that aim to find these similarities. For example, fuzzy hashing. This technique finds repeated fragments of malware that belong to specific families.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does fuzzy hashing stand for?<\/h2>\n\n\n\n<p>If an algorithm of a cryptographic hash function involves the smallest change of input data, even a bit of information, the hash transforms completely, too. Here we can say that fuzzy hashes are more preferable in regard to minor changes in a file such as c2 server, configuration information and so. And these alterations aim at a small part of the fuzzy hash compared to the cryptographic one. That is why these functions allow detecting new malware modification more effectively and don\u2019t require a large number of resources for calculation.&nbsp;<br><\/p>\n\n\n\n<p>So-called \u201cFuzzy hashing\u201d is a set of methods to preserve the similarity of hash functions or similarity digest. It is also a type of compression function for computing the similarity between individual files. Fuzzy hashing uses context-triggered piecewise hashing (CTPH).<br><\/p>\n\n\n\n<p>The classification of fuzzy hashing is pretty wide.&nbsp;<br><\/p>\n\n\n\n<p>According to workflow, algorithms can be:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>piecewise hashing,&nbsp;<\/li><li>context triggered piecewise hashing,&nbsp;<\/li><li>statistically improbable features,&nbsp;<\/li><li>block-based rebuilding.<\/li><\/ul>\n\n\n\n<p>According to the type of processed data, there are the following types:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Bit<\/li><li>Syntax<\/li><li>Semantic<\/li><\/ul>\n\n\n\n<p>But if we talk about fuzzy hashing, there is one method that is used the most \u2013&nbsp;CTPH.&nbsp;<br><\/p>\n\n\n\n<p>The SSDeep program was designed by Jesse Kornblum for computer forensics. It is based on the spamsum code. SSDeep computes several traditional cryptographic hashes of a fixed size and specific file fragments. This way the program identifies similar objects.&nbsp;<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How does SSDeep work?<\/h2>\n\n\n\n<p>The program consists of the following steps:<br><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>It divides a file into smaller parts and analyzes them, not the whole file.&nbsp;<\/li><li>It can identify file fragments that have similar bit sequences and order. Also, it can work with bits of 2 sequences where they can differ according to length and value.&nbsp;<\/li><\/ol>\n\n\n\n<p>SSDeep works with different kinds of malicious content including executable files, malicious documents, and others. Today we will focus on malicious documents to better illustrate this approach.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can we identify malicious files\u2019 similarities with SSDeep?&nbsp;<\/h2>\n\n\n\n<p>If you go to ANY.RUN Public Submissions, you can find a huge collection of samples there. We will investigate malicious documents, use the \u201cmaldoc-42\u201d tag to find the samples we mention today.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/vW7j7sQq_Opc86n1y64Ss4IhTFFB1RpDBGzLjtfZdgAksy8HxahrWLOOB5e-Mz3iplTO3iF37A84E5HPY_amKjYUK0POk_Gl4uT6vz7nV-wyS0NJtS4exeaHfWZPDWpihXiTqVNm\" alt=\"\"\/><\/figure>\n\n\n\n<p>Let\u2019s run one sample. Here is an excel file with quite a distinct picture with DocuSign written there. If we open one more <a href=\"https:\/\/app.any.run\/tasks\/37398abf-9a37-475c-86fe-d836e199d97e\">sample<\/a>, with a different hash we can see the DocuSign template again. Does it mean that these different samples have similarities?&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/qlE5VJTBxS2BOz6f2x_1AhV4CuTeBSmIT5PV3l7OTloceh6wHltNL0QAo36fn4KKmZ7gcSR1v5vVY4UVa-V4swFcadYXczHyoC4mvYF55KZiEK40_TlJTO1sa_kkaD87FHwBLLZg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/UcrOW3f3YaM50srnBhcP-CQGv0Xe6H34PrnyE_mitNJEGeHZKGAZ_4i-YDcmsZrVCjN_GLPJIwob_MM0MB8dQ3kCY18IJ0TcYktM9_d4hqaSWyh44A0LK6RBMI3S6O-U8AVOgFUs\" alt=\"\"\/><\/figure>\n\n\n\n<p>We took 11 samples of maldocs and each analyzed object has a unique cryptographic hash sum MD5.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Using SSDeep we can calculate the piecewise hash of each file and save it.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/3xBVEACQgNFKfXz9k6n0qqPECsDFvHrB9x_MApqhN0Db7JcnCn4bqS8vyur87qZ270fwekg4V2Rzy2shwY0KDbjjlbzYkQRwGKkT-gGqOQirlkqDcnZ5t7sFQDn4W6qxjOLf8SZv\" alt=\"\"\/><\/figure>\n\n\n\n<p>Maldocs files have different and similar hash fragments.&nbsp;&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/C1XS5r84TydDf1laNTXi2-eQdm98sXwrE5V1lv66p6mOPXz7pIQ5cAZOfp7_vdIBgQBtnBYp3QR55eQJHtWXuVi8aS0mvTxUx2bqxGi3PNexpNToT1wkYxH7AXaOqXkzw4plobwo\" alt=\"\"\/><\/figure>\n\n\n\n<p>Fuzzy hash can also be found in ANY.RUN\u2019s Static Discovering window by SSDeep name. <br><\/p>\n\n\n\n<p>Let\u2019s compare all analyzed objects between each other using fuzzy hashes. The percent of matching is on the right.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/0ZvnP-mc17lGExkLPECRXK5Az3dc6Abmaeha-hXXWujxSEKBAgiY7tHnrT00yfFNaSgD5NDXoi6HQo4tiRkUh_A6JFVxKoBdsb1Ho3QVUZIYKxopad-TU-gB3Hw1yg2sm_tIiwUO\" alt=\"\"\/><\/figure>\n\n\n\n<p>The image above shows 3 samples compared with others. It turns out that these maldocs have parts of code used constantly, that is what provides a similarity. And other maldocs keep the same tendency. And 5 pairs of them are even 100% identical.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/xobMW4t8Q46pM-K3u0MGNcWPtbMgYFV4RRbffqWbJqDVg10GIwbzzU750f2-0jjtGJTQIMloQxh-0Nd0JjbRt1jG6tAqF-cKNxT1SihrtS_YqG2Gb0jpu7QYiYyk1KM8g54vP_5a\" alt=\"\"\/><\/figure>\n\n\n\n<p>As a result, we have reviewed 11 maldocs with unique hashes. The found SSDeep showed 99% similarity between samples. Why is it so? They contain the same graphical pattern and deliver the same trojan malware.<br><\/p>\n\n\n\n<p>Despite the fact that all files in our experiment seemed exclusive, the high percentage of their similarity allows automatic detection of other malicious samples faster. Including unknown files for your system. Check the similar tag, see their behavioral details and you can predict what this new sample has inside, without opening it. The lifehack saves time and keeps you safe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the benefit of fuzzy hashing?&nbsp;<\/h2>\n\n\n\n<p>While analyzing malicious documents by SSDeep, we have got new relations between objects. Moreover, we have extended the knowledge base about these samples. It helps to effectively complement <a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\">signature malware analysis<\/a> with relatively low cost and quite reliable samples\u2019 footprints.&nbsp;<br><\/p>\n\n\n\n<p>Of course, there are other ways to find connections between different malware like imphash and others. We will try to cover them in the future. Please leave a comment if you like this topic.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware authors use a variety of methods to hide their creations from detection and cybersecurity analysts. However, researchers find similar samples by advanced hash algorithms. Today we will tell you how one of these algorithms work and show examples. Why do we need to identify malware similarities? In most cases, the existing base or core [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3748,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,8],"tags":[34,40],"class_list":["post-1916","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","category-malware-analysis","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Identify Malware Similarities with Fuzzy Hashing - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"We\u2019ve decided to run an investigation and find new relations between malicious samples using fuzzy hashing. Check out our results.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"How to Identify Malware Similarities with Fuzzy Hashing\",\"datePublished\":\"2021-10-14T11:11:55+00:00\",\"dateModified\":\"2022-12-21T06:49:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/\"},\"wordCount\":1386,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Cybersecurity Lifehacks\",\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/\",\"name\":\"How to Identify Malware Similarities with Fuzzy Hashing - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2021-10-14T11:11:55+00:00\",\"dateModified\":\"2022-12-21T06:49:02+00:00\",\"description\":\"We\u2019ve decided to run an investigation and find new relations between malicious samples using fuzzy hashing. Check out our results.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malicious History\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/history\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Identify Malware Similarities with Fuzzy Hashing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Identify Malware Similarities with Fuzzy Hashing - ANY.RUN&#039;s Cybersecurity Blog","description":"We\u2019ve decided to run an investigation and find new relations between malicious samples using fuzzy hashing. Check out our results.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"How to Identify Malware Similarities with Fuzzy Hashing","datePublished":"2021-10-14T11:11:55+00:00","dateModified":"2022-12-21T06:49:02+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/"},"wordCount":1386,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["malware analysis","malware behavior"],"articleSection":["Cybersecurity Lifehacks","Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/","url":"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/","name":"How to Identify Malware Similarities with Fuzzy Hashing - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2021-10-14T11:11:55+00:00","dateModified":"2022-12-21T06:49:02+00:00","description":"We\u2019ve decided to run an investigation and find new relations between malicious samples using fuzzy hashing. Check out our results.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-identify-malware-similarities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malicious History","item":"https:\/\/any.run\/cybersecurity-blog\/category\/history\/"},{"@type":"ListItem","position":3,"name":"How to Identify Malware Similarities with Fuzzy Hashing"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1916"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1916"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1916\/revisions"}],"predecessor-version":[{"id":3749,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1916\/revisions\/3749"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3748"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}