Static task
static1
General
-
Target
new-windows-nezur-executor-v1-byfron-bypassing-roblox
-
Size
16KB
-
MD5
82e805773320da80437cfdb9daa6aab2
-
SHA1
ad23d1b4202699922d889e40e22c2e84ff7abf29
-
SHA256
8e63139f2a143c35c5e827baf2b222e942c69f4f7f472dd4a93650ed7a71bb2f
-
SHA512
cd88f85dfddc3a3cd7e15f6b1eea0a51419d061f0cc25a32f742b36f6b60805645415fa3411d8b58c09c5024c1fbc3d0c365dd9ef08598f65738830aed60fdf7
-
SSDEEP
192:PNxqvrHA1oqTJkNr+f23pknmdBab32HgeucA2wB5s6pwhYFQyTN:qTg+oJkNifUAWBk32HgbcAXA6pwh4jN
Score
1/10
Malware Config
Signatures
Files
-
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html .js polyglot