← Back to SOC feed Coverage →

z3core

yara LOW Yara-Rules
communityz3core
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-05-06T23:00:00Z · Confidence: medium

Hunt Hypothesis

The z3core YARA rule detects potential exploitation of the Z3 solver library, which may indicate malicious code execution or code injection attempts. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify early-stage adversarial activity that could lead to deeper system compromise.

YARA Rule

rule z3core: amtrckr
{
	meta:
		family = "z3core"

	condition:
		androguard.url(/lexsmilefux\.link/)
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/deprecated/Android/Android_Amtrckr_20160519.yar