Composition Strategy
- Standalone: ✔
- Repackaging:
- Library:
Installation Strategy
- Drop: ✔
- Drive-by Download:
Activation Strategy
- Event: MAIN, MEDIA, NET, PKG, SYS
- By Host App:
- Scheduling:
Information Stealing
- Personal Information:
- Device Information:
Persistence
- Clean Evidence:
- Prevent Destroy:
Privilege Escalation
- Request Device Admin:
- Root Exploits: RageAgainstTheCage, GingerBreak
C&C
- Internet Server:
- SMS Server:
- Command Encoding:
Anti-analysis Techniques
- Renaming:
- String Encryption:
- Dynamic Loading:
- Native Payload: ✔
- Evade Dynamic Analysis:
Monetization Methods
- Subscribe to Premium Service:
- Banking Trojan:
- Ransom:
- Aggressive Advertisement: