Executes the following shell scripts:
- chmod 777 /data/user/0/<Package>/app_payload_lib/<Package>_empty_classes/oat/HJ1ONP015RRMIBP1QSRW1KCSL85NIC2.zip.cur.prof
- chmod 777 /data/user/0/<Package>/app_payload_lib/<Package>_empty_classes/oat/arm/HJ1ONP015RRMIBP1QSRW1KCSL85NIC2.odex
- chmod 777 /data/user/0/<Package>/app_payload_lib/<Package>_empty_classes/oat/arm/HJ1ONP015RRMIBP1QSRW1KCSL85NIC2.vdex
- chmod 777 /data/user/0/<Package>/app_payload_lib/<Package>_empty_classes/oat/arm/JP0ZDWL9V366NDDQG7ODGKSHSPB20EH.odex
- chmod 777 /data/user/0/<Package>/app_payload_lib/<Package>_empty_classes/oat/arm/JP0ZDWL9V366NDDQG7ODGKSHSPB20EH.vdex
- cp /data/user/0/<Package>/app_payload_lib/empty_classes.dex /data/user/0/<Package>/app_payload_lib/<Package>/BP7U8ZFYNDCPT0TYADONDXLV70IVMXXP.dex
- cp /data/user/0/<Package>/app_payload_lib/empty_classes.zip /data/user/0/<Package>/app_payload_lib/<Package>_empty_classes/HJ1ONP015RRMIBP1QSRW1KCSL85NIC2.zip
- cp /data/user/0/<Package>/app_payload_lib/empty_classes.zip /data/user/0/<Package>/app_payload_lib/<Package>_empty_classes/JP0ZDWL9V366NDDQG7ODGKSHSPB20EH.zip
- cp /data/user/0/<Package>/app_payload_lib/empty_classes.zip /data/user/0/<Package>/app_payload_lib/<Package>_empty_classes/YNZNDXQ9FEWE8IYW0B1BYWYO70RJNWN.zip
- dex2oat --dex-file=/data/user/0/<Package>/app_payload_lib/<Package>/BP7U8ZFYNDCPT0TYADONDXLV70IVMXXP.dex --oat-file=/data/user/0/<Package>/cache/<Package>/BP7U8ZFYNDCPT0TYADONDXLV70IVMXXP.dex --compiler-filter=verify-none --instruction-set=x86
- getprop ro.dalvik.vm.isa.arm
- getprop ro.dalvik.vm.isa.arm64
- sh -c dex2oat --dex-file=/data/user/0/<Package>/app_payload_lib/<Package>/BP7U8ZFYNDCPT0TYADONDXLV70IVMXXP.dex --oat-file=/data/user/0/<Package>/cache/<Package>/BP7U8ZFYNDCPT0TYADONDXLV70IVMXXP.dex --compiler-filter=verify-none --instruction-set=x86
Loads the following dynamic libraries:
Uses the following algorithms to decrypt data:
Uses special library to hide executable bytecode.
Gets information about network.
Gets information about active device administrators.
Gets information about installed apps.
Adds tasks to the system scheduler.
Displays its own windows over windows of other apps.
Requests the system alert window permission.
Appears corrupted in a way typical for malicious files.