AutoIT ransomware
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
(Publication) Google search: [1]
AutoIT ransomware | |
---|---|
Botnet | Ransom.II |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-07 |
Editor/Conference | Malware.lu |
Link | http://code.google.com/p/malware-lu/wiki/en analyse autoit ransomware (Archive copy) |
Author | Hugo Caron |
Type |
Abstract
“ We get from twitter a ransomware here, we do a fast analyse on it.
The md5 of the sample is f74e910c368717e9acef3a1b9a1a9f03.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1112, editor = {Malware.lu}, author = {Hugo Caron}, title = {AutoIT ransomware}, date = {01}, month = Jul, year = {2012}, howpublished = {\url{http://code.google.com/p/malware-lu/wiki/en_analyse_autoit_ransomware}}, }