Composition Strategy
        
            - Standalone: 
 
            - Repackaging: Integrated
 
            - Library: 
 
        
     
    
        Installation Strategy
        
            - Drop:  ✔ 
 
            - Drive-by Download: 
 
        
     
    
        Activation Strategy
        
            - Event: BOOT, MAIN
 
            - By Host App: 
 
            - Scheduling:  ✔ 
 
        
     
    
        Information Stealing
        
            - Personal Information: Phone Number
 
            - Device Information:  ✔ 
 
        
     
    
        Persistence
        
            - Clean Evidence: 
 
            - Prevent Destroy: reinstall
 
        
     
    
        Privilege Escalation
        
            - Request Device Admin:  ✔ 
 
            - Root Exploits: 
 
        
     
    
        C&C
        
            - Internet Server:  ✔ 
 
            - SMS Server: 
 
            - Command Encoding: Json
 
        
     
    
        Anti-analysis Techniques
        
            - Renaming: 
 
            - String Encryption: 
 
            - Dynamic Loading: 
 
            - Native Payload:  ✔ 
 
            - Evade Dynamic Analysis: 
 
        
     
    
        Monetization Methods
        
            - Subscribe to Premium Service: 
 
            - Banking Trojan: 
 
            - Ransom: 
 
            - Aggressive Advertisement:  ✔