General

  • Target

    new-windows-nezur-executor-v1-byfron-bypassing-roblox

  • Size

    8KB

  • MD5

    d7b72d03ea53688da42f63f075333b80

  • SHA1

    f6b0698e2e66c797c7df607d695f6ac8fb8ec935

  • SHA256

    2ad8bb8a91e438fd2ba423793911f87658f529137691474b21083027df1ccde3

  • SHA512

    bf1accc03873092c81f6fc5eb3c32869a32e4d2c2ecf773d2d3c449efc87e6495258872b1e3bf454702408acc7fb4a4acdb402ee42f878fe5b5b7eac670087c6

  • SSDEEP

    192:PN2x2BJ5GTYFbU46fXIgW3BFQ2bpJl0VFl6tbAHyutFfyYN:AxCFK46fIvBq2hoFl6tbAJ37N

Score
1/10

Malware Config

Signatures

Files

  • new-windows-nezur-executor-v1-byfron-bypassing-roblox
    .html .js polyglot