← Back to SOC feed Coverage →

Ruleset to detect android pornclicker trojan, connects to a remote host and obtains javascript and a list from urls gene

yara LOW Yara-Rules
backdoorcommunity
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-05-09T11:00:00Z · Confidence: medium

Hunt Hypothesis

The hypothesis is that the detected behavior represents an Android Pornclicker Trojan attempting to exfiltrate data by connecting to a remote host and downloading malicious JavaScript and URL lists used for redirecting users to adult content. A SOC team should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential data exfiltration and user exploitation attempts early in the attack lifecycle.

YARA Rule

rule trojan: pornClicker 
{
	meta:
		description = "Ruleset to detect android pornclicker trojan, connects to a remote host and obtains javascript and a list from urls generated, leading to porn in the end."
		sample = "5a863fe4b141e14ba3d9d0de3a9864c1339b2358386e10ba3b4caec73b5d06ca"
 		reference = "https://blog.malwarebytes.org/cybercrime/2016/06/trojan-clickers-gaze-cast-upon-google-play-store/?utm_source=facebook&utm_medium=social"
    author = "Koodous Project"
    
	strings:
		$a = "SELEN3333"
		$b = "SELEN33"
		$c = "SELEN333"
		$api = "http://mayis24.4tubetv.xyz/dmr/ya"
		
	condition:
		($a and $b and $c and $api) or androguard.url(/mayis24\.4tubetv\.xyz/)
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

This rule contains 4 string patterns in its detection logic.

References

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/deprecated/Android/Android_pornClicker.yar