MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 365d1b01cd5e605f6e7d39b192aaf56040176f2bce6eaec0fc11584850793a83. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SmartLoader


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: 365d1b01cd5e605f6e7d39b192aaf56040176f2bce6eaec0fc11584850793a83
SHA3-384 hash: 07d8c4357bd42e175b33721b42ceaf876f9e644eaba74c9571e7a8572c4567c175f046fee489fbaa62ede0d0c2d46db4
SHA1 hash: b8ed0237a3938c4722a4f725e7a80d54b9246a27
MD5 hash: 690d7c8018b8dc14efc22f52f3c3d0ae
humanhash: texas-early-texas-july
File name:cracked-annotator-webpage-extension-2.1-beta.4.zip
Download: download sample
Signature SmartLoader
File size:517'076 bytes
First seen:2026-02-27 10:29:09 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:7GRl4nbDDGIabs/7iiEVwYg2l3/2NHyy+wK8K:DTabs/7iiWw0KtxK
TLSH T176B423CE5A286CAC5BE85E834F5DBFDA2CF8413F862411F3F3581A14D4C956672A810F
Magika zip
Reporter tcains1
Tags:SmartLoader zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
US US
File Archive Information

This file archive contains 3 file(s), sorted by their relevance:

File name:luad.exe
File size:651'776 bytes
SHA256 hash: 88ec32a311b56441cfe6126b7780f073f36dfb8808de0dab9219d1a0be9c01ac
MD5 hash: b1535d38c1501d670ee19bfacdf12fd3
MIME type:application/x-dosexec
Signature SmartLoader
File name:Launch.bat
File size:23 bytes
SHA256 hash: dce5fc61e153377bb42b53b7dfca841399dd5c94d5fdf2631617a6df8c7cded1
MD5 hash: b9c3f7efd325c8df5530424182106713
MIME type:text/plain
Signature SmartLoader
File name:rsp.json
File size:310'865 bytes
SHA256 hash: acdd9ac3d55c4b1e12a239331145665d9eddf84a7a34fccac164f8afd006f875
MD5 hash: c73ba3c796aa5bbd96674feb2bc030e2
MIME type:text/plain
Signature SmartLoader
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
malware
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint microsoft_visual_cc
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Zip Archive
Threat name:
Win32.PUA.Lua
Status:
Malicious
First seen:
2026-02-27 10:29:25 UTC
File Type:
Binary (Archive)
Extracted files:
3
AV detection:
5 of 24 (20.83%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery execution persistence
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Drops file in Windows directory
Contacts third-party web service commonly abused for C2
Looks up external IP address via web service
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Capability_Embedded_Lua
Author:Obscurity Labs LLC
Description:Detects embedded Lua engines by looking for multiple Lua API symbols or env-var hooks
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

SmartLoader

zip 365d1b01cd5e605f6e7d39b192aaf56040176f2bce6eaec0fc11584850793a83

(this sample)

  
Delivery method
Distributed via web download

Comments