Static task
static1
Behavioral task
behavioral1
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win7-20240903-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win10v2004-20240802-en
7 signatures
150 seconds
General
-
Target
new-windows-nezur-executor-v1-byfron-bypassing-roblox
-
Size
16KB
-
MD5
7c629244afaf157e2e584b644fc41fa1
-
SHA1
82d97b8c3578e958798ab36f70b22ef2f0af5ebe
-
SHA256
3e12d73f72425decc1cacbc3dcaa8d5fe45dc9004bcc3ea1947107d14e03a9d6
-
SHA512
d7560b5e534247543c4bc6d1e7535d1e3e64131e8bacf32335ba0a900f3b819dd7ae2382e5b1524660d3d3eeab52c8cde6d17643de5ca57dab45f1eea7b9d97b
-
SSDEEP
192:PNxqvrHA1oqTJkNr+f23UKyyy+kS0rh6NxYX4UyL6mVF7LyNN:qTg+oJkNifw1yHVd68Il6mvSN
Score
1/10
Malware Config
Signatures
Files
-
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html .js polyglot