← Back to SOC feed Coverage →

slocker

yara LOW Yara-Rules
communityslocker
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-05-06T23:00:00Z · Confidence: medium

Hunt Hypothesis

The slocker rule detects potential early-stage indicators of a ransomware attack by identifying suspicious file artifacts associated with known ransomware families. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate threats before encryption occurs and lateral movement ensues.

YARA Rule

rule slocker: amtrckr
{
	meta:
		family = "slocker"

	condition:
		androguard.url(/aerofigg\.org/)
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/deprecated/Android/Android_Amtrckr_20160519.yar