Static task
static1
Behavioral task
behavioral1
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win10v2004-20241007-en
7 signatures
150 seconds
General
-
Target
new-windows-nezur-executor-v1-byfron-bypassing-roblox
-
Size
9KB
-
MD5
c7f05cb375427ad6f31285e2fe1393ab
-
SHA1
5b4b6916006342101a77d218ddaa87a6be0c267f
-
SHA256
09a66b7f2a915c6b62254ff56e41ecbafb76c4a5c9267b1dc22ff01f120c8576
-
SHA512
d466ee524172b9c56e9fe74eb2b1333c63e70621f8dfd5ffd9e9486888e26bd2597d549d675fff2f2fb5c7730d9a4513a9d076115ca365eceff92c452877f66c
-
SSDEEP
192:PN2x2BdVJR+nWhfBkLrmw0rPKZGvz5CP4k+fA5vTFHykN:Ax++n0ZQKw0zCCqZZN
Score
1/10
Malware Config
Signatures
Files
-
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html .js polyglot