Identify the real file type using magic bytes (headers), compare it with the file extension, and flag suspicious mismatches. Optionally compute file hashes. Attackers disguise malware by renaming ...