Static task
static1
Behavioral task
behavioral1
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win11-20240802-en
7 signatures
150 seconds
General
-
Target
new-windows-nezur-executor-v1-byfron-bypassing-roblox
-
Size
8KB
-
MD5
cf4d994d45ea9a3ebcf97b3ac8171ce2
-
SHA1
0dc9ab2060d636f1c7545c1b50a5b67b4c585ac5
-
SHA256
9d5eb4baa7a2b60d24939c7dcb2a9128495383afaf2535535df9a46b88f942f5
-
SHA512
994b1f49301fadc344e3318afcf42fd97a5311dda822c337bc4b05752175ed2a5851750ff566069aa9973b21d93b62229e1913e7ca81e3068877fef28715fe0a
-
SSDEEP
192:PN2x2Beis6xoRZPv+WP9uDWqSlcKIWfFzt2GU6KsWXFkygN:AxU4RZPxVBqSlcKwGU6lW1MN
Score
1/10
Malware Config
Signatures
Files
-
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html .js polyglot