MD5 Search

Malware MD5 Search

simply put the hash in the search box

You can use this service to compute an MD5 hash of a file from a database of many unique malware samples. When they come across malware, they return to the last place they saw it.

The security of the MD5 hash function is severely compromised. We use several hashes in Cobra Threat Intelligent, but MD5 searches are the most popular. MD5 hash databases should not be used as a substitute for security/antivirus software; rather, they provide you with an additional layer of detection enabling you to identify suspicious files.