One of the most powerful features of QuickSand.io is the ability to identify similar malware samples. We can use both the structhash (an md5 based on the structure of the document) and struzzy fuzzy hash to cluster samples. In this example, we will start with 500 recent samples of document malware with at least 10 detections on VirusTotal and write some python to count the number of unique similarity hashes. If two documents have the same structhush they likely originate from the same criminal or APT group or were generated from the same tool. We will build clusters to quickly group our 500 samples into buckets of similar samples to see what the main threats are. Out of the 500 randomly selected malware documents, we can quickly see some clusters with up to 76 samples with an identical structure denoted by an identical stucthash. We can use the fuzzy hash struzzy to squeeze out a few more similarities into the clusters as well. These samples might have a few minor differences as objec
document+pdf malware analysis