General

  • Target

    app-debug.apk

  • Size

    10.0MB

  • MD5

    8945762003b2f26c1b88009a2d56cfed

  • SHA1

    5a603434a69d10b1973056c7d77bf43370ca674e

  • SHA256

    9262f390f3f7a7002d15049f4e2f7144426437980f269d73c030705815938c94

  • SHA512

    25da342d16f9cd8b7656ae5d4ff06134ea376ca31b2c60e0779f46639c137a448d14e6b5bd26e8e0423400871488193158fe8fb0597f537edbe1c0fca0313331

  • SSDEEP

    196608:Dn5VmYBcLiGe+AOvdy9tMBcUwZALw7//t2IL9Ej9K550oHRt0ppI/ygQbpCT9og:Dn5bcmDduds+F+/tnGk50oP+I/PkCTag

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • app-debug.apk
    .apk android

    com.tutozz.blespam

    com.tutozz.blespam.MainActivity


Android Permissions

app-debug.apk

Permissions

android.permission.BLUETOOTH

android.permission.BLUETOOTH_ADMIN

android.permission.BLUETOOTH_ADVERTISE

com.tutozz.blespam.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION