|FlexiSpy can record both incoming and outgoing phone calls, as well as microphone audio.
|Data from Local System
|FlexiSpy can monitor device photos and can also access browser history and bookmarks.
|Event Triggered Execution
|FlexiSpy uses root access to establish reboot hooks to re-install the application from
/data/misc/adn. At boot, FlexiSpy spawns daemons for process monitoring, call monitoring, call managing, and system.
|Suppress Application Icon
|FlexiSpy is capable of hiding SuperSU’s icon if it is installed and visible. FlexiSpy can also hide its own icon to make detection and the uninstallation process more difficult.
|Hijack Execution Flow
|System Runtime API Hijacking
|FlexiSpy installs boot hooks into
|Indicator Removal on Host
|FlexiSpy can delete data from a compromised device.
|FlexiSpy can record keystrokes and analyze them for keywords.
|FlexiSpy can track the device’s location.
|FlexiSpy can communicate with the command and control server over ports 12512 and 12514.
|Obfuscated Files or Information
|FlexiSpy encrypts its configuration file using AES.
|Protected User Data
|FlexiSpy can collect the device calendars.
|FlexiSpy can collect device contacts.
|FlexiSpy can intercept SMS and MMS messages as well as monitor messages for keywords.
|FlexiSpy can take screenshots of other applications.
|FlexiSpy can retrieve a list of installed applications.
|Stored Application Data
|FlexiSpy uses a
FileObserver object to monitor the Skype and WeChat database file and shared preferences to retrieve chat messages, account information, and profile pictures of the account owner and chat participants. FlexiSpy can also spy on popular applications, including Facebook, Hangouts, Hike, Instagram, Kik, Line, QQ, Snapchat, Telegram, Tinder, Viber, and WhatsApp.
|System Network Connections Discovery
|FlexiSpy can collect a list of known Wi-Fi access points.
|FlexiSpy can record video.