Static task
static1
Behavioral task
behavioral1
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win10v2004-20240802-en
7 signatures
150 seconds
General
-
Target
new-windows-nezur-executor-v1-byfron-bypassing-roblox
-
Size
16KB
-
MD5
f0b4d76cb31a80a7ff4369176858ec23
-
SHA1
468c394f17941ab0334bd22ece070f1749ff3841
-
SHA256
d628b31dae14d15e46bcf07ab7fdd6b19c8b490b068d79a0c167da54beb73273
-
SHA512
9e6f257b38dbd9a31393f1b118c05e2e7f3845021ab7256f9a44fd453fc2ae9f2e9ab6aee7cb06b96e698c9489d2d5fe23a137b0c55bc5a7fb2e29e7d4ca2c03
-
SSDEEP
384:qTg+oJkNifuv7NAM5VejW5faKm6F8drXsN:WoJk9zV6hoN
Score
1/10
Malware Config
Signatures
Files
-
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html .js polyglot