Hamburger Menu Icon
Yoroi Background

Yomi Hunter Joined the VirusTotal Sandbox Program!

We are pleased to announce that Yomi the Malware Hunter has successfully completed the on-boarding in the VirusTotal MultiSandbox Program!

Official VirusTotal Announce: https://blog.virustotal.com/2019/05/virustotal-multisandbox-yoroi-yomi.html

Yoroi can now contribute to the fight against malware threats sharing its TLP:WHITE analysis with Chronicle Security, the Alphabet’s subsidiary author of the notorious VirusTotal Threat Intelligence platform: one of the most widely used community platforms all around the world. The Yomi analysis reports will be available on the “Behavior tab” of the VirusTotal analysis page.

Figure. Yomi Hunter report on VirusTotal

By clicking the “Full report”, every VT community user can now access the analysis report generated by the Yomi Sandbox, accessing fine grain details about malware execution, dropped files, https traffic, registry edits, spawned commands and system calls invocations. Including the MITRE ATT&CK™ matrix summarizing the key points of the malware attack.

Figure. Extracted MITRE ATT&CK™ matrix


If you want to try Yomi: The Malware Hunter please register here!


linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram