{
	"id": "6eb05339-36a0-48fa-8118-c9bbf859a413",
	"created_at": "2026-04-06T00:14:33.339291Z",
	"updated_at": "2026-04-10T03:20:36.433999Z",
	"deleted_at": null,
	"sha1_hash": "935fbea51d6fd14031c48a91508f82c3e7c806af",
	"title": "GitHub - SecurityBlueTeam/Smartloader_Wireshark: Wireshark dissector for Smartloader malware",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 65426,
	"plain_text": "GitHub - SecurityBlueTeam/Smartloader_Wireshark: Wireshark\r\ndissector for Smartloader malware\r\nBy blitztide-sbt\r\nArchived: 2026-04-05 20:54:05 UTC\r\nSkip to content\r\nNavigation Menu\r\nAI CODE CREATION\r\nGitHub CopilotWrite better code with AI\r\nGitHub SparkBuild and deploy intelligent apps\r\nGitHub ModelsManage and compare prompts\r\nMCP RegistryNewIntegrate external tools\r\nView all features\r\nPricing\r\nSign up\r\nNotifications\r\nFork 0\r\nStar 7\r\nFolders and files\r\nhttps://github.com/SecurityBlueTeam/Smartloader_Wireshark\r\nPage 1 of 3\n\nName Name\r\nLast commit\r\nmessage\r\nLast\r\ncommit\r\ndate\r\nLatest commit\r\nblitztide-sbt\r\nMerge pull request #3 from SecurityBlueTeam/DEV\r\nFeb 13, 2025\r\n1169e78 · Feb 13, 2025\r\nHistory\r\n7 Commits\r\nLICENSE.md LICENSE.md Initial commit\r\nFeb 11,\r\n2025\r\nReadme.md Readme.md Initial commit\r\nFeb 11,\r\n2025\r\nSmartloader_Encryption.lua Smartloader_Encryption.lua Initial commit\r\nFeb 11,\r\n2025\r\nbase64.lua base64.lua Initial commit\r\nFeb 11,\r\n2025\r\njson.lua json.lua Initial commit\r\nFeb 11,\r\n2025\r\nsmartloader.lua smartloader.lua\r\nFurther fixes\r\nto dump script\r\nFeb 13,\r\n2025\r\nhttps://github.com/SecurityBlueTeam/Smartloader_Wireshark\r\nPage 2 of 3\n\nName Name\r\nLast commit\r\nmessage\r\nLast\r\ncommit\r\ndate\r\nsmartloader_githubpayloaddump.lua smartloader_githubpayloaddump.lua\r\nFurther fixes\r\nto dump script\r\nFeb 13,\r\n2025\r\nREADME\r\nGPL-3.0 license\r\nSmartloader Wireshark plugin\r\nThis plugin is designed and tested on Wireshark 4.4.3 and is intended to decode C2 traffic for the Smartloader\r\nmalware variant.\r\nInstalling\r\nWindows users are to unzip the zip file in %APPDATA%\\Wireshark\\plugins . *nix users are to unzip the zip file in\r\n~/.local/lib/wireshark/plugins .\r\nConfiguring\r\nIn Preferences\u003eProtocols\u003eSmartloader you are able to enable/disable the plugin, and change the encryption key\r\nused by the malware.\r\nSource: https://github.com/SecurityBlueTeam/Smartloader_Wireshark\r\nhttps://github.com/SecurityBlueTeam/Smartloader_Wireshark\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://github.com/SecurityBlueTeam/Smartloader_Wireshark"
	],
	"report_names": [
		"Smartloader_Wireshark"
	],
	"threat_actors": [],
	"ts_created_at": 1775434473,
	"ts_updated_at": 1775791236,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/935fbea51d6fd14031c48a91508f82c3e7c806af.pdf",
		"text": "https://archive.orkl.eu/935fbea51d6fd14031c48a91508f82c3e7c806af.txt",
		"img": "https://archive.orkl.eu/935fbea51d6fd14031c48a91508f82c3e7c806af.jpg"
	}
}