To conclude, the presented Trojan commits malicious
actions by using permissions that are reasonable for its
supposed functionality, i.e. weather forecast retrieval.
Therefore, the user cannot detect the malware by
observing the requested permissions but rather by
monitoring the application’s activity or by consulting
other sources, like security reports and alerts.