Static task
static1
Behavioral task
behavioral1
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win10-20240611-en
10 signatures
1800 seconds
General
-
Target
new-windows-nezur-executor-v1-byfron-bypassing-roblox
-
Size
9KB
-
MD5
aa060e43c3a35b3121f48414c057d344
-
SHA1
b9b1864e62913f5d3e7d6b6f1e8f5d6d17aed154
-
SHA256
cae62cb6ffdabf4be23c7698254dde6525e923a4301e1848b9afab668ee26858
-
SHA512
d4401f1fa684bcded3ae64a3e01b53f77b9aa74407020fba871dde470b24ccddeb27caee77032110dc7585b5a965304ec1d28a8e9ba9b9a2a2568a57ba0ad34f
-
SSDEEP
192:PN2x2BI0I7KUmK6g9AMcz0krRHeDi4AmskCdFTnuPAfDOPF/y/rN:Axd0I7KUN6g9A7HlwsNFTnuofDOSrN
Score
1/10
Malware Config
Signatures
Files
-
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html .js polyglot