chg: [exercises/flubot-exercise] fixed sample url

main
Gerard Wagener 2024-12-15 21:53:12 +01:00
parent f844a184e2
commit ccf380c2cc
1 changed files with 2 additions and 2 deletions

View File

@ -60,7 +60,7 @@ We strongly believe that the seemingly random sequence of character at the end o
This is how far we have gotten so far. Please be mindful that this is an ongoing investigation, we would like to avoid informing the attacker of the detection and kindly ask you to only use the contained information to protect your constituents.
- Sample: [sample.apk](https://iglocska.eu/malicious.exe)
- Sample: [sample.apk](https://cra.circl.lu/malicious.exe)
## Type of data extracted from evidences
- Phishing SMS
@ -86,7 +86,7 @@ Caller left you a message: https://evilprovider.com/r.php?e1525c0f
- Phishing URL contained in the original SMS
- `8.231.77.176`
- Resolved IP address for the above domain
- [sample.apk](https://iglocska.eu/malicious.exe)
- [sample.apk](https://cra.circl.lu/malicious.exe)
- Malicious APK infecting the device
- `CVE-2022-27835`
- CVE exploited by the malware