General

  • Target

    MotionSourceiOS.ipa

  • Size

    282KB

  • MD5

    a964041ecc3adca042d5b060d45603c4

  • SHA1

    5a64072fbb120ede02e8b7a8f4b3172c57b0f402

  • SHA256

    fb34c40c6ed776c19fbbe601d2bbd63e61ed8601766b0b891a57cbc5dbeca777

  • SHA512

    d101c1846ff138c6fcf623116cecef9dec821bbe3f83a4361df8ad7971735d0e58b63d376e19bdef5300fb021e06eceb5ee7a676dab44e14123c2a7566870021

  • SSDEEP

    6144:Lvtji124+rLCtkkscPbCEmC+dDLp53bszo5ogX1ISnHLr4gT:Ltje2/pkspDdzgzo5ogX1L3BT

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • MotionSourceiOS.ipa
    .zip
  • Payload/MotionSourceiOS.app/[email protected]
    .png
  • Payload/MotionSourceiOS.app/AppIcon76x76@2x~ipad.png
    .png
  • Payload/MotionSourceiOS.app/Assets.car
    .pdf
  • Payload/MotionSourceiOS.app/Base.lproj/LaunchScreen.storyboardc/01J-lp-oVM-view-Ze5-6b-2t3.nib
  • Payload/MotionSourceiOS.app/Base.lproj/LaunchScreen.storyboardc/Info.plist
  • Payload/MotionSourceiOS.app/Base.lproj/LaunchScreen.storyboardc/UIViewController-01J-lp-oVM.nib
  • Payload/MotionSourceiOS.app/Base.lproj/Main.storyboardc/BYZ-38-t0r-view-8bC-Xf-vdC.nib/objects-13.0+.nib
  • Payload/MotionSourceiOS.app/Base.lproj/Main.storyboardc/BYZ-38-t0r-view-8bC-Xf-vdC.nib/runtime.nib
  • Payload/MotionSourceiOS.app/Base.lproj/Main.storyboardc/Info.plist
  • Payload/MotionSourceiOS.app/Base.lproj/Main.storyboardc/UIViewController-BYZ-38-t0r.nib/objects-13.0+.nib
  • Payload/MotionSourceiOS.app/Base.lproj/Main.storyboardc/UIViewController-BYZ-38-t0r.nib/runtime.nib
  • Payload/MotionSourceiOS.app/Info.plist
  • Payload/MotionSourceiOS.app/MotionSourceiOS
    .macho macos arch:arm64
  • Payload/MotionSourceiOS.app/PkgInfo