Attention: this post is not intended to being personal, or question anyone's skills in malware research.
I'm a newbie in malware analysis (although having 9 year of experience in ITSEC), and found a great community here, with a great resource of information.
We all are on the same side, fighting malware, and make the malware writers/operators life harder.
Please, take my post as a constructive criticism.
Now, after this long prologue, the reason I started this post is because:
I was so pissed off that a lot of malware research and analysis is published with the MD-5 hash of the malware only. And this is wrong. Very wrong.
Although it was practically safe to use MD-5 hashes 10 years ago to identify malware, since 2006, it is not.
Even a script kiddie can create two different malware having the same MD-5 hash.
The best would be to totally ban MD-5 from malware analysis at all. Using MD-5 to identify malware is almost the same as using CRC-32. Although CRC-32 has the advantege, because it takes less storage :geek:
I don't remember any case where the criminals did take advantege of this problem, but it might be that we as a community did not even notice this...
If you are interested in the details, I wrote a blog post about this issue.
http://jumpespjump.blogspot.com/2014/03 ... 5-now.html
TL;DR : Don't use MD-5 to identify malware samples. Believe me, it is a bad idea. Use SHA-256 or a stronger hash function.
I'm a newbie in malware analysis (although having 9 year of experience in ITSEC), and found a great community here, with a great resource of information.
We all are on the same side, fighting malware, and make the malware writers/operators life harder.
Please, take my post as a constructive criticism.
Now, after this long prologue, the reason I started this post is because:
I was so pissed off that a lot of malware research and analysis is published with the MD-5 hash of the malware only. And this is wrong. Very wrong.
Although it was practically safe to use MD-5 hashes 10 years ago to identify malware, since 2006, it is not.
Even a script kiddie can create two different malware having the same MD-5 hash.
The best would be to totally ban MD-5 from malware analysis at all. Using MD-5 to identify malware is almost the same as using CRC-32. Although CRC-32 has the advantege, because it takes less storage :geek:
I don't remember any case where the criminals did take advantege of this problem, but it might be that we as a community did not even notice this...
If you are interested in the details, I wrote a blog post about this issue.
http://jumpespjump.blogspot.com/2014/03 ... 5-now.html
TL;DR : Don't use MD-5 to identify malware samples. Believe me, it is a bad idea. Use SHA-256 or a stronger hash function.