Executes the following shell scripts:
- /system/bin/cat /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq
- /system/bin/cat /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_min_freq
- /system/bin/sh -c getprop
- df
- getenforce
- getprop
- grep /sbin/.magisk
- grep com.android.commands.monkey
- grep magisk
- ls /
- ls /sbin
- ls /sys/class/thermal
- mount
- ps
- sh -c df | grep /sbin/.magisk
- sh -c mount | grep /sbin/.magisk
- sh -c ls /sbin | grep magisk
- sh -c ps | grep magisk
- sh -c ps|grep com.android.commands.monkey
Loads the following dynamic libraries:
- Bugly
- X86Bridge
- hyphenate
- libjiagu450609810
- sqlite
- tdbugreport
- tongdun
Uses the following algorithms to encrypt data:
- AES-CBC-PKCS7Padding
- AES-ECB-PKCS5Padding
- AES-GCM-NoPadding
- RSA-ECB-PKCS1Padding
Uses the following algorithms to decrypt data:
Accesses the ITelephony private interface.
Uses special library to hide executable bytecode.
Gets information about location.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about installed apps.
Gets information about running apps.