Hashing detections are done by saving file hashes of known to be malicious files and comparing them with samples to be analyzed. If the file hashes match, this is a match and the sample is malicious.
This is typically done with MD5, SHA256, SHA1, and ssdeep algorithms, but can be done with virtually any hashing algorithm.