Executes next shell scripts:
- busybox cp <Package Folder>/files/android.hardware.usb.host.xml /system/etc/permissions/android.hardware.usb.host.xml
- chmod 644 /system/etc/permissions/android.hardware.usb.host.xml
- chmod 755 <Package Folder>/.jiagu/libjiagu.so
- mount -o remount /dev/block/nanda /system
- sh
- su
Loads the following dynamic libraries:
Uses elevated priveleges.
Uses special library to hide executable bytecode.
Gains access to network information.
Gains access to telephone information (number, imei, etc.).
Displays its own windows over windows of other applications.