Add Hydra malware family analysis report#892
Merged
haeter525 merged 4 commits intoev-flow:masterfrom Mar 27, 2026
Merged
Conversation
Added new Quark rule for Hydra malware detection with detailed analysis and behavior maps.
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #892 +/- ##
=======================================
Coverage 81.31% 81.31%
=======================================
Files 80 80
Lines 6946 6946
=======================================
Hits 5648 5648
Misses 1298 1298
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Updated image URLs in the malware report to new links.
haeter525
approved these changes
Mar 27, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
New Quark Rules For Hydra
New Quark rule (#263) is now available. This rule targets Hydra, a banking trojan family that intercepts SMS messages to capture OTPs, performs overlay attacks to steal banking credentials, communicates with C2 servers for remote control, and collects device fingerprints for tracking. Check here for the rule details.
With this rule, Quark is now able to identify the Hydra malware family as high-risk. In our experiment, Quark achieved 100% accuracy and 100% precision. Please check here for the APKs we tested.
Below is a summary report of a Hydra sample (
3154684c4192a1ae7a00f9f61d3024e2d25a85508c512094a771f878c3130848). The report shows that Quark identified the sample as high-risk, with a list of behaviors as evidence.Identified Well-Known Threats
With Quark's rule classification feature, analysts can generate behavior maps and see how behaviors are related. This feature helps identify 6 well-known threats from Hydra, as shown below.
1. Intercept SMS messages to capture OTPs and banking codes
The behavior map shows that the
Lcom/payu/custombrowser/PayUCBLifecycle$7;onReceivefunction reads SMS messages from PDU format, queries the phone number from the SMS sender, and retrieves data from the broadcast. This behavior is commonly used by banking trojans to intercept one-time passwords (OTPs) sent via SMS.Behaviors detected by Quark:
2. Overlay attacks to deceive users into revealing sensitive information
The behavior map shows that the
Lcom/mopub/mobileads/BaseWebView;clearWebViewDeadlockfunction retrieves the application context and adds a view to the window manager. By adding a view through the WindowManager, the APK can display an overlay window on top of other applications, potentially mimicking a legitimate banking app to steal user credentials.Behaviors detected by Quark:
3. Communicate with C2 servers for remote control
The behavior map shows that the
Lcom/ufotosoft/ad/utils/CachedBitmapFactory;decodeBitmapHTTPfunction callsLcom/ufotosoft/ad/utils/HttpUtil;decodeBitmapHttp, which connects to a remote server through a given URL and reads the input stream. This behavior is commonly used for C2 communication, allowing attackers to send commands and receive stolen data.Behaviors detected by Quark:
4. Collect device fingerprints for tracking
The behavior map shows two functions collecting device identifiers. The
Lcom/douban/amonsul/device/DeviceInfo;initPhoneInfofunction queries the IMEI number, IMSI number, and the network operator name. TheLcom/alipay/sdk/util/a;<init>function queries the IMEI number, IMSI number, and WiFi information including the MAC address. These identifiers can be used to uniquely identify and track infected devices.Behaviors detected by Quark:
5. Detect foreground applications to trigger overlay attacks
The behavior map shows a transitive call chain:
Lcom/igexin/push/extension/distribution/basic/a/a;aandLcom/igexin/push/extension/distribution/basic/a/a;bboth call a intermediate function that uses reflection and dynamic class loading, which in turn callsLcom/igexin/push/extension/distribution/basic/j/c;bto check the list of currently running applications. This is a prerequisite behavior for overlay attacks — when a targeted banking app is detected in the foreground, the malware triggers the overlay to display a phishing screen.Behaviors detected by Quark:
6. Inject JavaScript into WebView for credential harvesting
The behavior map shows that the
Lcom/payu/sdk/ProcessPaymentActivity;onCreatefunction allows a website to access internal methods and retrieves data from a broadcast. By injecting a JavaScript interface into a WebView, the malware can interact with web content displayed in the WebView, potentially modifying banking pages or extracting form data entered by users.Behaviors detected by Quark:
List of Tested APKs
The table below lists the APKs we tested.