Uses the following algorithms to encrypt data:
Uses administrator priveleges.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about active device administrators.
Adds tasks to the system scheduler.
Displays its own windows over windows of other apps.
Parses information from SMS.
Gets information about sent/received SMS.
Intercepts notifications.
Requests the system alert window permission.
Appears corrupted in a way typical for malicious files.