Bomber icon

145.apk

Bomber

4.61 MB

Analyzed: 2026-02-09 07:57 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
25/100
Threat scan flagged Modern target SDK
Privacy Permissions & network
87/100
High-risk permissions AllowBackup enabled Possible tracking
39/100
High Risk
Overall trust

Facts

Threat scan 16/76 flagged, 0 suspicious
Permissions 13 requested
Network strings 16 URLs (0 HTTP, 16 HTTPS)
Target SDK 36
Certificate Valid until 2046-05-15 (20 years, suspicious)

Warnings

Threat scan flagged: 16/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.REQUEST_INSTALL_PACKAGES, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.RECEIVE_BOOT_COMPLETED
AllowBackup is enabled.
Possible analytics/tracking domains found: app-measurement.com, firebase-settings.crashlytics.com, pagead2.googlesyndication.com
Package Name com.dm.bomber
Version Code 145
Version Name 1.39.1
Application Name com.dm.bomber.BomberApplication
Debuggable No
Allow Backup Yes
Min SDK Android 23 (Marshmallow)
Target SDK Android 36 (Unknown)
Supported ABIs
arm64-v8a armeabi-v7a x86_64

Certificate & Signer

Valid From 2021-05-21 18:05:22
Valid To 2046-05-15 18:05:22
Serial Number 5b3a7360
Thumbprint 177bedc092b9f777654878049141743aa419d6f6
Issuer: CN Dmitry Kotov
Issuer: DN CN:Dmitry Kotov
Subject: CN Dmitry Kotov
Subject: DN CN:Dmitry Kotov

Security Scan

16 /76
⚠️ Threats Detected
Detected by 16 vendors: AhnLab-V3 (PUP/Android.Malct.1208923), Avast-Mobile (APK:RepMalware [Trj]), Avira (TR/AVI.Agent.zogus)
Scanned by 76 security vendors
Last scan: 2026-02-07 22:27 UTC
Malicious
16
Suspicious
0
Harmless
0
Undetected
54
Timeout
0
Failure
0

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.745
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
PUP/Android.Malct.1208923
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile malicious
APK:RepMalware [Trj]
Engine 260207-04
Avira malicious
TR/AVI.Agent.zogus
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Riskware.Agent.gQPAD
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX malicious
apk.trojan.smsflooder
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.1.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet malicious
Malicious (score: 99)
Engine 4.0.3.4
DeepInstinct undetected
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.74.11120
ESET-NOD32 malicious
Android/SMSFlooder.Agent.LX potentially unsafe application
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.248
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure malicious
Trojan.TR/AVI.Agent.zogus
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43460AVA:64.30624
Google malicious
Detected
Engine 1770498044
Gridinsoft undetected
No result reported
Engine 1.0.237.174
Ikarus malicious
Trojan-Spy.Agent
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.34.58524
K7GW malicious
Trojan ( 0056e5201 )
Engine 14.34.58524
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft malicious
Android.Troj.SMSFlooder.LX
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.207
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.13644
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.25110.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising malicious
PUA.SMSFlooder/Android!8.696 (CLOUD)
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne undetected
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight malicious
AppRisk:Generisk
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-02-07.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.9.0
TrellixENS malicious
Artemis!42781E479337
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook malicious
Android.PUA.Spyware
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.0
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1140
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38392
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5539
ZoneAlarm undetected
No result reported
Engine 6.22-112233745
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 05e2752:05e2752:17658e4:17658e4
tehtris type-unsupported
No result reported
Engine v0.1.4

File Signatures

SHA-256 d50fcbb44542bfe6f866d4a6a410244f81de408af3ab3189b553e5985111fd86
MD5 42781e4793373e23b4dd66463b261413
SHA-1 1c4752e761c39988c3a2018f23b9c77018920eb6
SSDEEP 98304:wgXbMaRTy01MSVf16gVjNqmKusSWyAhAeNYAZThMP1urQH4:fvTNjVjChNYsK4
TLSH T17126F1C6F7A8992FC87750B68D6A52B1125A4C028F83DF477544336C38B76E80F99BD8
VHASH 69f14ea5bbe56afe2ffb7fdfee66669e
PERMHASH 8aa778afc2bad12fe012d6892cb671c647d92091dae3580432708c8d458347cc

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v0.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (40%), Java Archive (20%), VYM Mind Map (18.5%), Sweet Home 3D Design (generic) (15.5%), ZIP compressed archive (5.9%) TrID file type guesses with probabilities.
dhash 0000001c1e090c08 Perceptual hash used to compare visual similarity of files.
raw md5 0fc2ef8d49f7e5fc26dbfffb49e5d6c4 Raw MD5 hash of the file contents.
extensions xml (654), png (210), version (70), properties (20), txt (10), kotlin_builtins (8), json (4), jnilib (3), so (3), c (2), dll (2), a (1), arsc (1), b (1), bin (1), conf (1), dex (1), f (1), k (1), list (1), prof (1), profm (1), proto (1), textproto (1), yaml (1) File extensions found inside the APK and how many of each.
file types XML (654), PNG (210), unknown (126), ELF (3), Mac OS X Executable (3), Portable Executable (2), DEX (1), Java Bytecode (1) Detected embedded file types and their counts.
highest datetime 1981-01-01 01:01:02 UTC Latest timestamp found among files inside the archive.
lowest datetime 1981-01-01 01:01:02 UTC Earliest timestamp found among files inside the archive.
num children 1003 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 8.8 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (2)

com.dm.bomber.ui.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
View Activity Action: Display the data to the user. android.intent.action.VIEW
Dial Activity Action: Dial a number as specified by the data. android.intent.action.DIAL
Categories
android.intent.category.LAUNCHER android.intent.category.DEFAULT android.intent.category.BROWSABLE
com.dm.bomber.ui.webview.WebViewActivity
Categories
android.intent.category.LAUNCHER

Service Intents (2)

com.dm.bomber.service.CallScreeningService
Actions
android.telecom.CallScreeningService android.telecom.CallScreeningService
com.dm.bomber.service.QSTile
Actions
android.service.quicksettings.action.QS_TILE android.service.quicksettings.action.QS_TILE

Receiver Intents (3)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
Actions
Install performance profile Installs a profile that helps optimize app performance. androidx.profileinstaller.action.INSTALL_PROFILE
Skip profile install Skips profile installation for this build. androidx.profileinstaller.action.SKIP_FILE
Save performance profile Saves a profile generated during app usage. androidx.profileinstaller.action.SAVE_PROFILE
Benchmark operation Runs a profile installer benchmark operation. androidx.profileinstaller.action.BENCHMARK_OPERATION
Work rescheduler Reschedules background work after reboot or app update. androidx.work.impl.background.systemalarm.RescheduleReceiver
Actions
Boot Completed Broadcast Action: This is broadcast once, after the system has finished android.intent.action.BOOT_COMPLETED
androidx.work.impl.diagnostics.DiagnosticsReceiver
Actions
androidx.work.diagnostics.REQUEST_DIAGNOSTICS androidx.work.diagnostics.REQUEST_DIAGNOSTICS

Native Libraries (1)

libnative-lib libnative-lib.so

Requested Permissions (13)

have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
android.permission.REQUEST_INSTALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_INSTALL_PACKAGES
android.permission.POST_NOTIFICATIONS Custom app or vendor permission (not publicly documented). android.permission.POST_NOTIFICATIONS
android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS Custom app or vendor permission (not publicly documented). android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS
keep car screen turned on Allows the app to keep the car screen turned on. android.permission.WAKE_LOCK
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
run at startup Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the app to slow down the overall tablet by always running. android.permission.RECEIVE_BOOT_COMPLETED
Foreground service Allows the app to run a foreground service. android.permission.FOREGROUND_SERVICE
com.google.android.gms.permission.AD_ID Custom app or vendor permission (not publicly documented). com.google.android.gms.permission.AD_ID
AdServices Attribution Required to call AdServices Attribution APIs. android.permission.ACCESS_ADSERVICES_ATTRIBUTION
AdServices Advertising ID Required to call AdServices Advertising ID APIs. android.permission.ACCESS_ADSERVICES_AD_ID
Install Referrer service Allows Google Play to bind to the app's Install Referrer service for install attribution. com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. com.dm.bomber.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

Activities (3)

com.dm.bomber.ui.MainActivity
com.dm.bomber.ui.webview.WebViewActivity
com.google.android.gms.common.api.GoogleApiActivity

Services (11)

com.dm.bomber.service.QSTile
com.dm.bomber.service.CallScreeningService
androidx.work.impl.background.systemjob.SystemJobService
androidx.work.impl.foreground.SystemForegroundService
com.google.firebase.components.ComponentDiscoveryService
com.google.firebase.sessions.SessionLifecycleService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
androidx.room.MultiInstanceInvalidationService
com.google.android.datatransport.runtime.backends.TransportBackendDiscovery
com.google.android.datatransport.runtime.scheduling.jobscheduling.JobInfoSchedulerService

Broadcast Receivers (6)

androidx.work.impl.utils.ForceStopRunnable$BroadcastReceiver androidx.work.impl.utils.ForceStopRunnable$BroadcastReceiver
Work rescheduler Reschedules background work after reboot or app update. androidx.work.impl.background.systemalarm.RescheduleReceiver
androidx.work.impl.diagnostics.DiagnosticsReceiver androidx.work.impl.diagnostics.DiagnosticsReceiver
com.google.android.gms.measurement.AppMeasurementReceiver com.google.android.gms.measurement.AppMeasurementReceiver
Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
com.google.android.datatransport.runtime.scheduling.jobscheduling.AlarmManagerSchedulerBroadcastReceiver com.google.android.datatransport.runtime.scheduling.jobscheduling.AlarmManagerSchedulerBroadcastReceiver

Content Providers (3)

androidx.startup.InitializationProvider
androidx.core.content.FileProvider
com.google.firebase.provider.FirebaseInitProvider

Submission Details

Submitted At 2026-02-09
First Submission 2026-02-09
Last Submission 2026-02-09
Stored Until 2026-03-11