General

  • Target

    new-windows-nezur-executor-v1-byfron-bypassing-roblox

  • Size

    16KB

  • MD5

    82e805773320da80437cfdb9daa6aab2

  • SHA1

    ad23d1b4202699922d889e40e22c2e84ff7abf29

  • SHA256

    8e63139f2a143c35c5e827baf2b222e942c69f4f7f472dd4a93650ed7a71bb2f

  • SHA512

    cd88f85dfddc3a3cd7e15f6b1eea0a51419d061f0cc25a32f742b36f6b60805645415fa3411d8b58c09c5024c1fbc3d0c365dd9ef08598f65738830aed60fdf7

  • SSDEEP

    192:PNxqvrHA1oqTJkNr+f23pknmdBab32HgeucA2wB5s6pwhYFQyTN:qTg+oJkNifUAWBk32HgbcAXA6pwh4jN

Score
1/10

Malware Config

Signatures

Files

  • new-windows-nezur-executor-v1-byfron-bypassing-roblox
    .html .js polyglot