Uses the following algorithms to encrypt data:
Uses the following algorithms to decrypt data:
- PBEWithMD5AndDES
- RSA-ECB-PKCS1Padding
Accesses the ITelephony private interface.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about installed apps.
Displays its own windows over windows of other apps.
Parses information from SMS.
Gets information about sent/received SMS.
Intercepts notifications.
Requests the system alert window permission.
Appears corrupted in a way typical for malicious files.
Attempts to detect sandbox environment.