Static task
static1
Behavioral task
behavioral1
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win7-20240704-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win10v2004-20240802-en
10 signatures
150 seconds
General
-
Target
new-windows-nezur-executor-v1-byfron-bypassing-roblox
-
Size
8KB
-
MD5
7dc3c9b86353b164e3c8d7c4482eea11
-
SHA1
7732f19f7f3cb2b874954aaeaf29f29bbe426d0e
-
SHA256
a8da4ac706bee0c0ccbe4c73c9c03be314dcd693955673baa24553631ba3ca0d
-
SHA512
aa45f44fbb270af877acf5afaf08330b2186519786b96a45c1170aa70dc3536ef02f19dd20f0b0ab8fcacf37bf351b07eb1073ae13f407cc13d695af730217ac
-
SSDEEP
192:PN2x2By5XQzUqjX18qJPHRO++u4+GRBA665DzWtirF9ytN:AxNwXV/M+KR165DatiBAN
Score
1/10
Malware Config
Signatures
Files
-
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html .js polyglot