Uses administrator priveleges.
Accesses the ITelephony private interface.
Accesses camera interface.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about active device administrators.
Displays its own windows over windows of other apps.
Gets information about sent/received SMS.
Intercepts notifications.
Requests the system alert window permission.
Appears corrupted in a way typical for malicious files.
Attempts to detect sandbox environment.