Executes the following shell scripts:
Loads the following dynamic libraries:
Uses elevated priveleges.
Accesses the ITelephony private interface.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about active device administrators.
Gets information about installed apps.
Displays its own windows over windows of other apps.
Intercepts notifications.
Appears corrupted in a way typical for malicious files.
Attempts to detect sandbox environment.