← Back to SOC feed Coverage →

android meterpreter

yara LOW Yara-Rules
community
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-05-08T11:00:00Z · Confidence: medium

Hunt Hypothesis

The detection rule identifies potential Android Meterpreter payloads embedded in files, which could indicate the presence of a compromised device or remote code execution capability. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect early-stage adversarial activity and prevent further exploitation within their environment.

YARA Rule

rule android_meterpreter : android
{
    meta:
        author="73mp74710n"
        ref = "https://github.com/zombieleet/yara-rules/blob/master/android_metasploit.yar"
        comment="Metasploit Android Meterpreter Payload"
        
    strings:
	$checkPK = "META-INF/PK"
	$checkHp = "[Hp^"
	$checkSdeEncode = /;.Sk/
	$stopEval = "eval"
	$stopBase64 = "base64_decode"
	
    condition:
	any of ($check*) or any of ($stop*)
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

This rule contains 5 string patterns in its detection logic.

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/deprecated/Android/Android_Metasploit.yar