Data Products

Malware Hashes

File hash intelligence

Database of known malware file hashes. Check files against our database to identify malware families and threats.

100M+
Hashes
1,000+
Families
Daily
Updates
MD5/SHA
Formats

Key Features

Everything you need to protect your infrastructure and users

Multiple Hash Types

MD5, SHA1, and SHA256 for each sample.

Family Classification

Malware families and variants identified.

Sandbox Data

Behavioral analysis from sandbox execution.

Daily Updates

New samples added every day.

API Lookup

Real-time hash checking via API.

Bulk Download

Download hash lists for offline use.

Use Cases

How security teams use this tool

Endpoint Protection

Block files matching known malware hashes.

Email Gateway

Check attachments against hash database.

Incident Response

Identify malware during investigations.

Threat Hunting

Search for malware presence in your environment.

Frequently Asked Questions

What hash types do you support?
MD5, SHA1, and SHA256 hashes. All three are included for each sample.
How do you classify malware families?
Through sandbox analysis, AV vendor detections, YARA rules, and manual analysis.
Can I submit samples?
Yes, Enterprise customers can submit samples for analysis and inclusion in the database.
How often is the database updated?
New hashes are added daily from sandbox runs and vendor feeds.

Ready to Get Started?

Join thousands of security teams using isMalicious to protect their infrastructure.