3 talks mention this tool across 3 BSides chapters.
Import hash technique for identifying malware variants by analyzing the order of imported DLLs in PE files