General

  • Target

    new-windows-nezur-executor-v1-byfron-bypassing-roblox

  • Size

    9KB

  • MD5

    ebc83d0a43a2d25eed3db56eafc611eb

  • SHA1

    1c87e283aa4a98198dbb20ec5fe5241903a91c63

  • SHA256

    7f07bc2263dbe953661f2b43263c83a173de706ce5f2f3bf6159b6766669e891

  • SHA512

    8519fed141f612bff6ee052c759d054e06786bbaff5907160a88e99c7f784c1a2d274b030934736e239631e453b6587e03fa63ab7641468deec12ccbce84fb1a

  • SSDEEP

    192:PN2x2BG8UBY+YlODIQh0bkLMP9H0Z7gYdx5ePM4cs0I5e6e2F8ywQN:AxP8UB3ws0rr25ePms0aHUQN

Score
1/10

Malware Config

Signatures

Files

  • new-windows-nezur-executor-v1-byfron-bypassing-roblox
    .html .js polyglot