← Back to SOC feed Coverage →

infostealer

yara LOW Yara-Rules
communityinfostealer
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-05-06T23:00:00Z · Confidence: medium

Hunt Hypothesis

The infostealer detection rule identifies potential credential or data exfiltration activities by unknown malware leveraging Azure environment interactions. SOC teams should proactively hunt for this behavior to detect early-stage adversaries exploiting Azure resources for data theft.

YARA Rule

rule infostealer: amtrckr
{
	meta:
		family = "infostealer"

	condition:
		androguard.url(/koko02\.ru/)
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/deprecated/Android/Android_Amtrckr_20160519.yar