This guide is here to help you make informed decisions, but the final call on file safety is yours.
Use your best judgment and be cautious. If you're unsure, consider seeking professional help from a security expert.
1. Check the Scan Date
2. Check the Details Tab
3. Check the Submitted Names
4. If It's a Pirated Software
5. Check the Relations Tab
6. Check the Contacted IP Addresses/URLs
7. Check the Behavior Tab
8. Check the Detections Tab
9. Check the Highlighted Actions
10. Check the File Age
11. Check If It Has Multiple Similar Detections
12. Consider the Community Tab
13. Conclusion
14. Credits
When conducting a VirusTotal (VT) scan, follow these steps to thoroughly analyze the results:
(Go to the VirusTotal site → Upload your file or search the file hash/url → Look at the top-right side of the screen.)
• Creation Time, First Seen In The Wild, and First Submission:
◦ Creation Time may be unreliable if obviously fake (e.g., set in the future).
◦ Compare First Seen In The Wild and First Submission dates with the product release date to identify recycled malware.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Details' tab.)
• Ignore names resembling hashes or generic terms like 'sample1.exe'.
• Multiple names for unrelated products suggest potential malware.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Details' tab → Scroll down until you see the 'Names' section.)
• For pirated software, signatures won't be helpful as cracks or patched files won't be valid, but typically if there was an invalid signature it would be suspicious.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Details' tab → Scroll down until you see the 'Signature info' section.)
\• Execution Parents/Resource Parents:
◦ Focus on installers or archives that contained, dropped, or downloaded the file. Ignore if scanning an installer that wasn't extracted from another file.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Relations' tab → Scroll down until you see the 'Execution Parents' section.)
• Dropped Files/Bundled Files:
◦ Examine files extracted from the scanned file, particularly useful when scanning archive files.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Relations' tab → Scroll down until you see the 'Bundled Files (Number of bundled files)' section → Scroll down a bit more until you see the 'Dropped Files (Number of dropped files)' section.)
• Graph Summary
◦ Take a quick glance at everything once more.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Relations' tab → Scroll down until you see the 'Graph Summary' section.)
• Beware of overwhelming malicious results, but also consider false positives. (e.g. drive.google.com is currently flagged as a phishing site by one of the AVs)
• Suspicion arises if a file meant to be benign (e.g., a keygen or patcher) makes unexpected requests.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Relations' tab → Scroll down until you see the 'Contacted IP addresses (Number of contacted IPs)' section.)
• Opening and reading files, writing/deleting temp files, and expected installer activities are generally benign.
• Suspicion arises if the file exhibits unusual behavior or accesses unnecessary areas.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Behavior' tab → Scroll down and notice the info presented to you.)
• Generic/gen/susgen detections (like W32.Trojan.Gen) or AI/ML labels may indicate potential malware that doesn't match known signatures.
• Common detections for cracks, patches, etc., include riskware, hacktool, and not-a-virus (last on is specific to Kaspersky).
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Detection' tab → Scroll down and notice the info presented to you.)
• Although rare, alarming statements like 'all your files are belong to us', take immediate action.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Behavior' tab → Scroll down until you see the 'Highlighted actions' tab.)
• New files may lack accurate detections, while older files should have more reliable results.
• A file's age can provide context; newer files warrant closer scrutiny.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Details' tab → Scroll down until you see the 'History' tab.)
• If numerous specific detections align, it indicates higher risk.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Look at the 'Popular threat label' section → Look at the 'Threat categories' section → Look at the 'Family labels' section.)
• While often cluttered, occasionally valuable insights or warnings are found.
(Go to the VirusTotal site → Upload your file or search the file hash/url → Click on the 'Details' tab → Scroll down until you see the 'Community' tab.)
• Even with thorough analysis, some uncertainty may remain. Exercise caution with older files with generic detections.
• If unsure, refrain from using the file.
Old owner - Unknown (not a username)
New / Current Owner - Clara
(With <3)
If you have any feedback you want to give me, please fill in a form here.