A new tool can be found on the Internet published by the Internet Storm Center. Via this tool a Hash can be checked against a legit software Whitelist.
The value given in can be searched in the NIST, the National Software Reference Libary where hashes of legit software are kept. The size of this Database now consits of 39.944.023 samples.
After giving in the hash click the Submit button.
At the bottom of the page you later find the text with all the necessary information,
Well the total number of hashes in that depository shows that it has not listed them all.
It is a start, and I sincerely hope it will be more complete over time.
This hashscantool can be used additionally.
Download the application ‘Agics System Scan’ Agics Systemscan 1.5.0.0
from here: http://www.backgroundtask.eu/Systeemscan/Setup.exeAutomatic
Install the application.
Follow the instructions on the screen
Agics systemscan 1.5.0.0 has been tested on Windows XP and Vista. Windows 7 support will soon be available. The files will be uploaded to the website using a ftp connection. Files will be automatically removed from our website in four hours.
Manually
Hold the Windows key and press R.
A RUN screen comes up. Type Msinfo32 and press ENTER
A system info screen comes forward.
Go to File → Export
Give the file a name and save it somewhere where you can find the file.
Open the file created on this page and press SEND.
Processing can take several minutes,
And you also use it to some good avail, now you have a second link to check against.
Also check these:
What we should not forget to check online is a source for CLSIDs: http://www.sysinfo.org/bholist.php http://www.autohotkey.com/docs/misc/CLSID-List.htm http://www.systemlookup.com/lists.php?list=1
because there are over 6000 of them and , we like to establish which one is malware beyond a shadow of a doubt?
So we have to go online, find a term, a name of a dll, an entry from a log, then see what there is written about it, what victims have reported and so we get more and more good information and real knowledge about the malware at hand and what it does and so how to remove it,