Report page for Similarity

The Similarity page displays information about files that are similar to the analyzed file.

Using machine-learning (ML) methods, Kaspersky systems extract the requested file features and detect similar malicious files. Information about similar files can be used in an incident response to search more extensively for modifications and variations of a malicious object. This information allows you to optimize perimeter protection from certain threats and take into account different modifications and variations of a malicious object.

Please note, Kaspersky Threat Intelligence Portal and Kaspersky Threat Attribution Engine use different approaches to detect file similarity. Kaspersky Threat Intelligence Portal searches for similarity by special hashes, while Kaspersky Threat Attribution Engine searches by genotypes and strings extracted from the body of the file. For more information, please see Kaspersky Threat Attribution Engine documentation.

The Similarity report page contains the sections described in the table below.

Similarity page

Section

Description

Fields

Analyzed file

Name of the analyzed file and whether similar files were found: Similar files found or Similar files not found.

You can download information about detected similar files as an archive by clicking the Export results button.

Summary

Date and time when the file analysis started.

Sample & Content

Information about similar files. Contains the data described in the table below.

Depending on the submitted object, this section contains the following:

  • Not an archive—Section with analysis results for the submitted file.
  • Archive containing one file—Section with analysis results for the submitted archive and section with analysis results for the extracted file.
  • Archive containing more than one file—Section with analysis results for the submitted archive and section with a list of extracted files, without analysis results.

Info

General information about the analyzed file.

MD5—MD5 hash of the executed file. This item is clickable and takes you to the Threat Lookup page, where you can search for information about the MD5 hash.

SHA1—SHA1 hash of the executed file. This item is clickable and takes you to the Threat Lookup page, where you can search for information about the SHA1 hash.

SHA256—SHA256 hash of the executed file. This item is clickable and takes you to the Threat Lookup page, where you can search for information about the SHA256 hash.

File name—Name of the analyzed file.

Size—Size of the executed file in bytes.

Similar files

Information about detected similar files.

You can click the Download data button located by this section to export the corresponding data. The button is available if the section contains data.

Status—Status of the file that is similar to the analyzed file. If necessary, use the filter to view files with a specific status: Malware, Good, Not categorized.

Detection name—Name of the detected object (for example, HEUR:Exploit.Script.Blocker).

Confidence—Level of confidence that the object is similar to the submitted file. Kaspersky Threat Intelligence Portal displays similar files with a confidence level from 8 to 11.

First seen—Date and time when the similar file was detected by Kaspersky expert systems for the first time (for your local time zone).

Last seen—Date and time, accurate to one minute, when the similar file was detected by Kaspersky expert systems for the last time (for your local time zone).

Hits—Number of hits (popularity) for the file similar to the analyzed file that was detected by Kaspersky expert systems (rounded to nearest power of 10).

MD5—MD5 hash of the file similar to the analyzed file. Items are clickable, you can select the following actions:

  • Copy to copy the hash to the clipboard.
  • Lookup to start the hash lookup and view results on the Threat Lookup page.
  • Lookup in a new tab—to start the hash lookup and view results on the Threat Lookup page in a new tab.

    Type—Type of the file similar to the analyzed file.

    Size—Size of the file similar to the analyzed file.

Statistics for similar files

Statistical information about detected similar files.

Similarity—Total number of detected similar files.

Confidence summary—Chart that displays the total number of similar files, and the proportion of confidence levels.

Status summary—Chart that displays the total number of similar files, and the proportion of files with Malware (red) and Clean (green), Adware and other (yellow), and Not categorized (gray) status.

Detection namesDetected objects (for example, HEUR:Exploit.Script.Blocker):

  • Name—Name of the detected object.
  • Number—Number of similar files that contain the detected object.

Archive content

Information about files extracted from the submitted archive. This section is displayed if the archive contains more than one file.

  • MD5—MD5 hash of the extracted file.
  • File name—Name of the extracted file.
  • TypeType of the extracted file.

Page top