The detection identifies potential Android Locker malware named Pink Club, which may restrict device access and display malicious content. SOC teams should proactively hunt for this behavior to mitigate ransomware-like tactics and protect user data in their Azure Sentinel environment.
YARA Rule
rule Android_pinkLocker : android
{
meta:
description = "Yara detection for Android Locker app named Pink Club"
author = "@5h1vang"
ref1 = "https://www.virustotal.com/es/file/388799cbbe2c8ddc0768c4b994379508e602f68503888a001635c3be2c8c350d/analysis/"
ref2 = "https://analyst.koodous.com/rulesets/1186"
sample = "388799cbbe2c8ddc0768c4b994379508e602f68503888a001635c3be2c8c350d"
strings:
$str_1 = "arnrsiec sisani"
$str_2 = "rhguecisoijng ts"
$str_3 = "assets/data.db"
$str_4 = "res/xml/device_admin_sample.xmlPK"
condition:
androguard.url(/lineout\.pw/) or
androguard.certificate.sha1("D88B53449F6CAC93E65CA5E224A5EAD3E990921E") or
androguard.permission(/android.permission.INTERNET/) and
androguard.permission(/android.permission.DISABLE_KEYGUARD/) and
all of ($str_*)
}
This YARA rule can be deployed in the following contexts:
This rule contains 4 string patterns in its detection logic.
Scenario: Scheduled backup job using Android Debug Bridge (ADB)
adb or check for adb in the command line arguments.Scenario: System update or patching via Mobile Device Management (MDM) tool
IntuneAgent, WorkspaceOne) or filter by known update scripts.Scenario: Admin task to reset device settings using ADB
root, admin) or check for adb shell in the command line.Scenario: Legitimate Android app with similar file structure
PinkClub) could trigger the rule due to false positive matching.com.example.pinkclub).Scenario: Automated security scan using tools like Tripwire or OSSEC
tripwire, ossec) or apply a whitelist for known scan directories.