Executes the following shell scripts:
- /system/bin/su
- rm -r/data/user/0/<Package>/app_ded/MFOZW0aLbwXZZnZYnL7ZJKTdcm0wu17F.dex
- rm -r/data/user/0/<Package>/app_ded/mFFVYUgpTtUpFmKQ5QaZ5ab2ZMQc5usf.dex
Loads the following dynamic libraries:
Uses elevated priveleges.
Uses special library to hide executable bytecode.
Displays its own windows over windows of other apps.
Requests the system alert window permission.
Appears corrupted in a way typical for malicious files.
Attempts to detect sandbox environment.