Imagine that you're got an access to the android smartphone by social engineering. When you're done with victim's data, you want to save the access for future exploitation. But the victim is doesn't feel comfortable with the "MainActivity.apk". Is it possible to gain access to the phone even the victim's about to delete the .apk file? Something like a ghost in the android shell.