Executes the following shell scripts:
- chmod 755 <Package Folder>/.jiagu/libjiagu748665856.so
- date
- df
- id
- ls /dev/socket
- ls /system/fonts
- mkdir -p <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/
- ps
- service call iphonesubinfo 1
- sh -c cat
- sh -c cat /proc/meminfo
- sh -c cat /proc/sys/kernel/osrelease
- sh -c cat /proc/sys/kernel/random/boot_id
- sh -c cat /proc/sys/kernel/random/uuid
- sh -c cat /sys/block/mmcblk0/device/cid
- sh -c cat /sys/class/net/eth0/address
- sh -c cat /sys/class/net/eth1/address
- sh -c cat /sys/class/net/eth2/address
- sh -c cat <SD-Card>/../../../../../..<SD-Card>/._android.dat
- sh -c cat <SD-Card>/../../../../../..<SD-Card>/._driver.dat
- sh -c cat <SD-Card>/../../../../../..<SD-Card>/._system.dat
- sh -c cat <SD-Card>/../../../../../..<SD-Card>/.aio.dat
- sh -c cat <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/_driver.dat
- sh -c cat <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/_system.dat
- sh -c cat <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/aio.dat
- sh -c cd /proc/;cat cpuinfo
- sh -c cd /proc/net/ && cat arp
- sh -c cd /proc/self/;cat status
- sh -c cd /sys/class/net/eth0/ && cat address
- sh -c cd /sys/class/net/wlan0/ && cat address
- sh -c echo MzIzQ0E2OEE5OTU0NDdEQTMwQ0U3NERGOTE4Rjk2RjgwMjA3ODQ6MTcwOURFOkI5REREMg== > <SD-Card>/../../../../../..<SD-Card>/._android.dat
- sh -c echo MzIzQ0E2OEE5OTU0NDdEQTMwQ0U3NERGOTE4Rjk2RjgwMjA3ODQ6MTcwOURFOkI5REREMg== > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/_android.dat
- sh -c echo NTU4NkFDQkI1NjY4QTJCQTM4MjcwNTg1NzJDMzRBOURBRjhFNDA6MDFBODJFOkFCQzgzQw== > <SD-Card>/../../../../../..<SD-Card>/._driver.dat
- sh -c echo NTU4NkFDQkI1NjY4QTJCQTM4MjcwNTg1NzJDMzRBOURBRjhFNDA6MDFBODJFOkFCQzgzQw== > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/_driver.dat
- sh -c echo QjU4NUVFQTBCMEQ3MkI1Mzg5QjM5ODQ1MzQ1NUNFMDMzQzdBQjU6ODg2Qzc4OjI3RERDMw== > <SD-Card>/../../../../../..<SD-Card>/._system.dat
- sh -c echo QjU4NUVFQTBCMEQ3MkI1Mzg5QjM5ODQ1MzQ1NUNFMDMzQzdBQjU6ODg2Qzc4OjI3RERDMw== > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/_system.dat
- sh -c echo RDA0MjUyMjkzNkVGQTIxMTA0QjQ4REI2Q0Y5RUNGNkIxNTU0NTU3Mjcz > <SD-Card>/../../../../../..<SD-Card>/.aio.dat
- sh -c echo RDA0MjUyMjkzNkVGQTIxMTA0QjQ4REI2Q0Y5RUNGNkIxNTU0NTU3Mjcz > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/aio.dat
Loads the following dynamic libraries:
- BaiduMapSDK_base_v5_1_0
- YYDroidJni
- du
- libjiagu748665856
- locSDK7b
Uses the following algorithms to encrypt data:
Uses the following algorithms to decrypt data:
Accesses the ITelephony private interface.
Uses special library to hide executable bytecode.
Gets information about location.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about installed apps.
Gets information about running apps.
Adds tasks to the system scheduler.
Displays its own windows over windows of other apps.