An analyst is investigating a suspected malware file. Which of the following options is the BEST course of action to determine if the file has been previously identified as malicious by multiple antivirus engines?
Examine the organization's firewall logs for any record of the file being downloaded.
Generate a hash of the file and compare it to known good file hashes.
Review the application logs where the file was originally executed.
Upload the file to VirusTotal to check it against multiple antivirus engines.