← Back to SOC feed Coverage →

ibanking

yara LOW Yara-Rules
communityibanking
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-05-07T11:00:00Z · Confidence: medium

Hunt Hypothesis

The ibanking rule detects potential credential theft or unauthorized access attempts by identifying suspicious file artifacts associated with banking-related activities. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate early-stage adversary activity that could lead to data exfiltration or lateral movement.

YARA Rule

rule ibanking: amtrckr
{
	meta:
		family = "ibanking"

	condition:
		androguard.url(/www\.irmihan\.ir/) or 
		androguard.url(/emberaer\.com/)
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/deprecated/Android/Android_Amtrckr_20160519.yar