VirusTotal MultiSandbox += Yoroi: Yomi sandbox

We are excited to welcome Yomi: The Malware Hunter from Yoroi to the mutisandbox project. This brings VirusTotal upl to seven integrated sandboxes, in addition to VT’s own sandboxes for Windows, MacOS, and Android.

In their own words:

Yomi engine implements a multi-analysis approach able to exploit both static analysis and behavioral analysis, providing ad hoc analysis path for each kind of files. The static analysis section includes document and macro code extraction, imports, dependencies and trust chain analysis. The behavioral detection engine is weaponized to recognize suspicious actions the malware silently does, giving a powerful insight on command and control, exfiltration and lateral movement activities over the network, including encrypted channels. Each analysis is reported in an intuitive aggregated view to spot interesting patterns at a glance.

Some recent samples on VirusTotal with reports from Yoroi:

LNK file:



HTTPS, mitm tab:

Multiple file types, .g. dot file (strings)

Mitre Att&ck, ransomware


Piccadilly Chambers
Dudley House
169 Piccadilly
London W1J 9EH

Phone +44 (0) 20 3858 3100

© 2020 by Falcon Capital LLP

Falcon Capital LLP (Registration No. OC320410 ) - Authorised and regulated by the Financial Conduct Authority