From ccf380c2cc624f02d858b3504a40c1baf24ea9af Mon Sep 17 00:00:00 2001 From: Gerard Wagener Date: Sun, 15 Dec 2024 21:53:12 +0100 Subject: [PATCH] chg: [exercises/flubot-exercise] fixed sample url --- exercises/flubot-exercise/exercise.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/exercises/flubot-exercise/exercise.md b/exercises/flubot-exercise/exercise.md index 8192a5f..8cba8b9 100644 --- a/exercises/flubot-exercise/exercise.md +++ b/exercises/flubot-exercise/exercise.md @@ -60,7 +60,7 @@ We strongly believe that the seemingly random sequence of character at the end o This is how far we have gotten so far. Please be mindful that this is an ongoing investigation, we would like to avoid informing the attacker of the detection and kindly ask you to only use the contained information to protect your constituents. -- Sample: [sample.apk](https://iglocska.eu/malicious.exe) +- Sample: [sample.apk](https://cra.circl.lu/malicious.exe) ## Type of data extracted from evidences - Phishing SMS @@ -86,7 +86,7 @@ Caller left you a message: https://evilprovider.com/r.php?e1525c0f - Phishing URL contained in the original SMS - `8.231.77.176` - Resolved IP address for the above domain -- [sample.apk](https://iglocska.eu/malicious.exe) +- [sample.apk](https://cra.circl.lu/malicious.exe) - Malicious APK infecting the device - `CVE-2022-27835` - CVE exploited by the malware