Static task
static1
Behavioral task
behavioral1
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win7-20241010-en
7 signatures
1800 seconds
Behavioral task
behavioral2
Sample
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html
Resource
win10v2004-20241007-en
9 signatures
1800 seconds
General
-
Target
new-windows-nezur-executor-v1-byfron-bypassing-roblox
-
Size
9KB
-
MD5
ebc83d0a43a2d25eed3db56eafc611eb
-
SHA1
1c87e283aa4a98198dbb20ec5fe5241903a91c63
-
SHA256
7f07bc2263dbe953661f2b43263c83a173de706ce5f2f3bf6159b6766669e891
-
SHA512
8519fed141f612bff6ee052c759d054e06786bbaff5907160a88e99c7f784c1a2d274b030934736e239631e453b6587e03fa63ab7641468deec12ccbce84fb1a
-
SSDEEP
192:PN2x2BG8UBY+YlODIQh0bkLMP9H0Z7gYdx5ePM4cs0I5e6e2F8ywQN:AxP8UB3ws0rr25ePms0aHUQN
Score
1/10
Malware Config
Signatures
Files
-
new-windows-nezur-executor-v1-byfron-bypassing-roblox.html .js polyglot