Executes the following shell scripts:
- chmod 755 <Package Folder>/.jiagu/libjiagu.so
- chmod 777 /storage/emulated/0/appDown
- chmod 777 <Package Folder>/databases/assets/IjiaTVService.apk
Loads the following dynamic libraries:
Uses the following algorithms to decrypt data:
Accesses the ITelephony private interface.
Uses special library to hide executable bytecode.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Displays its own windows over windows of other apps.