Executes the following shell scripts:
- rm -r/data/user/0/<Package>/app_ded/3iqBZpYf1GDjGAOXqmf8OLncgV11RUC6.dex
- rm -r/data/user/0/<Package>/app_ded/kNRcgjtbV1Ox2sG5DKv02CV9YC8snhZm.dex
- rm -r/data/user/0/<Package>/app_ded/mo0xJFYV4vZmn3qU3oexA78xtplZuZxt.dex
- rm -r/data/user/0/<Package>/app_ded/wwN2Veeb1yx5LGVd51t64tHoGVJAef19.dex
Loads the following dynamic libraries:
Uses the following algorithms to encrypt data:
Uses the following algorithms to decrypt data:
- AES
- AES-CBC-PKCS5Padding
- AES-ECB-PKCS5Padding
- RSA-ECB-PKCS1Padding
Uses special library to hide executable bytecode.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about active device administrators.
Adds tasks to the system scheduler.
Displays its own windows over windows of other apps.
Gets information about sent/received SMS.
Requests the system alert window permission.
Appears corrupted in a way typical for malicious files.
Attempts to detect sandbox environment.
Contains hidden alternative main activities.