Executes the following shell scripts:
- /system/bin/sh -c getprop
- /system/bin/sh -c type su
- date
- df
- getprop
- id
- ip link
- ls /dev/socket
- ls /system/fonts
- mkdir -p <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/
- ps
- service call iphonesubinfo 1
- sh -c cat /proc/meminfo
- sh -c cat /sys/class/net/eth0/address
- sh -c cd /proc/;cat cpuinfo
- sh -c cd /proc/net/ && cat arp
- sh -c cd /proc/self/;cat status
- sh -c echo NjcwQjE0NzI4QUQ5OTAyQUVDQkEzMkUyMkZBNEY2QkQwMDAwMDA= > <SD-Card>/../../../../../..<SD-Card>/.n_a
- sh -c echo NjcwQjE0NzI4QUQ5OTAyQUVDQkEzMkUyMkZBNEY2QkQwMDAwMDA= > <SD-Card>/../../../../../..<SD-Card>/.n_b
- sh -c echo NjcwQjE0NzI4QUQ5OTAyQUVDQkEzMkUyMkZBNEY2QkQwMDAwMDA= > <SD-Card>/../../../../../..<SD-Card>/.n_c
- sh -c echo NjcwQjE0NzI4QUQ5OTAyQUVDQkEzMkUyMkZBNEY2QkQwMDAwMDA= > <SD-Card>/../../../../../..<SD-Card>/.n_d
- sh -c echo NjcwQjE0NzI4QUQ5OTAyQUVDQkEzMkUyMkZBNEY2QkQwMDAwMDA= > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/n_a
- sh -c echo NjcwQjE0NzI4QUQ5OTAyQUVDQkEzMkUyMkZBNEY2QkQwMDAwMDA= > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/n_b
- sh -c echo NjcwQjE0NzI4QUQ5OTAyQUVDQkEzMkUyMkZBNEY2QkQwMDAwMDA= > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/n_c
- sh -c echo NjcwQjE0NzI4QUQ5OTAyQUVDQkEzMkUyMkZBNEY2QkQwMDAwMDA= > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/n_d
- sh -c echo OEFEODY1REU1RjhGMkI2MjVGMEUxMjg4OEM5M0E5MzNkY2ZiNTc2MWQ3Mzk0Mzk3OWQ3NDQ2YTI2YmQ5NzZhawo= > <SD-Card>/../../../../../..<SD-Card>/.duid
- sh -c echo OEFEODY1REU1RjhGMkI2MjVGMEUxMjg4OEM5M0E5MzNkY2ZiNTc2MWQ3Mzk0Mzk3OWQ3NDQ2YTI2YmQ5NzZhawo= > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/duid
- sh -c echo QjU4NUVFQTBCMEQ3MkI1Mzg5QjM5ODQ1MzQ1NUNFMDMzQzdBQjU6ODg2Qzc4OjI3RERDMw== > <SD-Card>/../../../../../..<SD-Card>/._system.dat
- sh -c echo QjU4NUVFQTBCMEQ3MkI1Mzg5QjM5ODQ1MzQ1NUNFMDMzQzdBQjU6ODg2Qzc4OjI3RERDMw== > <SD-Card>/../../../../../..<SD-Card>/.o_a
- sh -c echo QjU4NUVFQTBCMEQ3MkI1Mzg5QjM5ODQ1MzQ1NUNFMDMzQzdBQjU6ODg2Qzc4OjI3RERDMw== > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/_system.dat
- sh -c echo QjU4NUVFQTBCMEQ3MkI1Mzg5QjM5ODQ1MzQ1NUNFMDMzQzdBQjU6ODg2Qzc4OjI3RERDMw== > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/o_a
- sh -c echo RjM4NjdENjBFOTA2NDdCMTBEMEY3OEFFQUZBOTNBNzdDMUE2N0Q6OTQ5MzNBOjg3NzZCRA== > <SD-Card>/../../../../../..<SD-Card>/._android.dat
- sh -c echo RjM4NjdENjBFOTA2NDdCMTBEMEY3OEFFQUZBOTNBNzdDMUE2N0Q6OTQ5MzNBOjg3NzZCRA== > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/_android.dat
Loads the following dynamic libraries:
- Bugly
- du
- getuiext3
- libjiagu1142300537
Uses the following algorithms to encrypt data:
- AES-CBC-PKCS5Padding
- AES-CBC-PKCS7Padding
- AES-GCM-NoPadding
- RSA
- RSA-ECB-OAEPPadding
- RSA-ECB-PKCS1Padding
- RSA-NONE-OAEPWithSHA1AndMGF1Padding
Uses the following algorithms to decrypt data:
- AES-CBC-PKCS7Padding
- AES-GCM-NoPadding
Uses special library to hide executable bytecode.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about installed apps.
Adds tasks to the system scheduler.
Displays its own windows over windows of other apps.