We are excited to welcome Yomi: The Malware Hunter from Yoroi to the mutisandbox project. This brings VirusTotal upl to seven integrated sandboxes, in addition to VT’s own sandboxes for Windows, MacOS, and Android.
In their own words:
Yomi engine implements a multi-analysis approach able to exploit both static analysis and behavioral analysis, providing ad hoc analysis path for each kind of files. The static analysis section includes document and macro code extraction, imports, dependencies and trust chain analysis. The behavioral detection engine is weaponized to recognize suspicious actions the malware silently does, giving a powerful insight on command and control, exfiltration and lateral movement activities over the network, including encrypted channels. Each analysis is reported in an intuitive aggregated view to spot interesting patterns at a glance.
Some recent samples on VirusTotal with reports from Yoroi:
LNK file:
Ransomware:
emotet:
HTTPS, mitm tab:
Multiple file types, .g. dot file (strings)
Mitre Att&ck, ransomware
Source: https://blog.virustotal.com/2019/05/virustotal-multisandbox-yoroi-yomi.html?m=1