Static task
static1
Behavioral task
behavioral1
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win11-20240802-en
8 signatures
150 seconds
General
-
Target
new-windows-nezur-executor-v1-byfron-bypassing-roblox
-
Size
8KB
-
MD5
d7b72d03ea53688da42f63f075333b80
-
SHA1
f6b0698e2e66c797c7df607d695f6ac8fb8ec935
-
SHA256
2ad8bb8a91e438fd2ba423793911f87658f529137691474b21083027df1ccde3
-
SHA512
bf1accc03873092c81f6fc5eb3c32869a32e4d2c2ecf773d2d3c449efc87e6495258872b1e3bf454702408acc7fb4a4acdb402ee42f878fe5b5b7eac670087c6
-
SSDEEP
192:PN2x2BJ5GTYFbU46fXIgW3BFQ2bpJl0VFl6tbAHyutFfyYN:AxCFK46fIvBq2hoFl6tbAJ37N
Score
1/10
Malware Config
Signatures
Files
-
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html .js polyglot