How the user is infected initially is by downloading an already infected app. Once the malware takes its place on the user’s device, it has the ability to install and execute additional malware through its dropper module.
Read full article on HackRead