C:\Users\DarkCoderSc\Desktop\Celesty Binder\Stub\STATIC\Stub.pdb
Overview
overview
10Static
static
10Soul_stealer-main.zip
windows7-x64
1Soul_stealer-main.zip
windows10-2004-x64
1Soul_steal...DME.md
windows7-x64
3Soul_steal...DME.md
windows10-2004-x64
3Soul_steal...er.exe
windows7-x64
7Soul_steal...er.exe
windows10-2004-x64
8�`*0X}~.pyc
windows7-x64
�`*0X}~.pyc
windows10-2004-x64
Soul_steal...OBF.py
windows7-x64
3Soul_steal...OBF.py
windows10-2004-x64
3Soul_steal...s/cert
windows7-x64
1Soul_steal...s/cert
windows10-2004-x64
1Soul_steal...g.json
windows7-x64
3Soul_steal...g.json
windows10-2004-x64
3Soul_steal...der.py
windows7-x64
3Soul_steal...der.py
windows10-2004-x64
3Soul_steal...ess.py
windows7-x64
3Soul_steal...ess.py
windows10-2004-x64
3Soul_steal...ess.py
windows7-x64
3Soul_steal...ess.py
windows10-2004-x64
3Soul_steal...ar.exe
windows7-x64
3Soul_steal...ar.exe
windows10-2004-x64
3Soul_steal...eg.key
windows7-x64
3Soul_steal...eg.key
windows10-2004-x64
3Soul_steal...ts.txt
windows7-x64
1Soul_steal...ts.txt
windows10-2004-x64
1Soul_steal...un.bat
windows7-x64
1Soul_steal...un.bat
windows10-2004-x64
1Soul_steal...ief.py
ubuntu-18.04-amd64
1Soul_steal...ief.py
debian-9-armhf
1Soul_steal...ief.py
debian-9-mips
Soul_steal...ief.py
debian-9-mipsel
Behavioral task
behavioral1
Sample
Soul_stealer-main.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Soul_stealer-main.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Soul_stealer-main/README.md
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Soul_stealer-main/README.md
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Soul_stealer-main/Soul Stealer/Builder.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Soul_stealer-main/Soul Stealer/Builder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
�`*0X}~.pyc
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
�`*0X}~.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Soul_stealer-main/Soul Stealer/Components/BlankOBF.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Soul_stealer-main/Soul Stealer/Components/BlankOBF.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Soul_stealer-main/Soul Stealer/Components/cert
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
Soul_stealer-main/Soul Stealer/Components/cert
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
Soul_stealer-main/Soul Stealer/Components/config.json
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Soul_stealer-main/Soul Stealer/Components/config.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Soul_stealer-main/Soul Stealer/Components/loader.py
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
Soul_stealer-main/Soul Stealer/Components/loader.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Soul_stealer-main/Soul Stealer/Components/postprocess.py
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
Soul_stealer-main/Soul Stealer/Components/postprocess.py
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
Soul_stealer-main/Soul Stealer/Components/process.py
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Soul_stealer-main/Soul Stealer/Components/process.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Soul_stealer-main/Soul Stealer/Components/rar.exe
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
Soul_stealer-main/Soul Stealer/Components/rar.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
Soul_stealer-main/Soul Stealer/Components/rarreg.key
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Soul_stealer-main/Soul Stealer/Components/rarreg.key
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
Soul_stealer-main/Soul Stealer/Components/requirements.txt
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Soul_stealer-main/Soul Stealer/Components/requirements.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
Soul_stealer-main/Soul Stealer/Components/run.bat
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
Soul_stealer-main/Soul Stealer/Components/run.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
Soul_stealer-main/Soul Stealer/Components/sigthief.py
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral30
Sample
Soul_stealer-main/Soul Stealer/Components/sigthief.py
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral31
Sample
Soul_stealer-main/Soul Stealer/Components/sigthief.py
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral32
Sample
Soul_stealer-main/Soul Stealer/Components/sigthief.py
Resource
debian9-mipsel-20240418-en
General
-
Target
Soul_stealer-main.zip
-
Size
6.7MB
-
MD5
1a952d2ee32c3c81a154946c70f66fa8
-
SHA1
175203103856deec4ce8cc20feeb322ec6b41a86
-
SHA256
d49d6f48c8f34584d09ea6ece0a9bf2196a40f090aa6a195f95bc720cecde3f5
-
SHA512
19844c6cf98cb9ae7d5702c816dfb3662a09f0f45bfeb529e73e6ee6938a35a41efe5513b93e5857913d032e8200df323f2f348d89398b159e52ddc92a7c46e7
-
SSDEEP
98304:KNiDPHBiP2wQmHZ/7aw8ZyYtPhrgJDh9HrAXlF4BTmYIR2wAupWOYWMwJpfyHvrQ:KSH0PPaHhXramlFSSYIkwAuplYWMw/6s
Malware Config
Signatures
-
A stealer written in Python and packaged with Pyinstaller 1 IoCs
resource yara_rule static1/unpack002/�`*0X}~.pyc blankgrabber -
Blankgrabber family
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule static1/unpack003/out.upx patched_upx -
resource yara_rule static1/unpack001/Soul_stealer-main/Soul Stealer/Components/upx.exe upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/Soul_stealer-main/Soul Stealer/Builder.bat unpack001/Soul_stealer-main/Soul Stealer/Components/upx.exe unpack003/out.upx
Files
-
Soul_stealer-main.zip.zip
-
Soul_stealer-main/README.md
-
Soul_stealer-main/Soul Stealer/Builder.bat.exe windows:5 windows x86 arch:x86
9222d372923baed7aa9dfa28449a94ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileA
FindResourceA
FreeLibrary
LoadResource
WriteFile
SizeofResource
GetProcAddress
LoadLibraryA
LockResource
EnumResourceNamesA
CloseHandle
FreeResource
GetWindowsDirectoryA
OutputDebugStringA
GetTempPathA
GetModuleHandleW
ExitProcess
DecodePointer
EncodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetStdHandle
GetModuleFileNameW
Sleep
HeapSize
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
LCMapStringW
MultiByteToWideChar
GetStringTypeW
shell32
ShellExecuteA
SHGetSpecialFolderPathA
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
�`*0X}~.pyc
-
Soul_stealer-main/Soul Stealer/Components/BlankOBF.py
-
Soul_stealer-main/Soul Stealer/Components/cert
-
Soul_stealer-main/Soul Stealer/Components/config.json
-
Soul_stealer-main/Soul Stealer/Components/loader.py
-
Soul_stealer-main/Soul Stealer/Components/postprocess.py
-
Soul_stealer-main/Soul Stealer/Components/process.py
-
Soul_stealer-main/Soul Stealer/Components/rar.exe.exe windows:5 windows x64 arch:x64
9a33888e10929c185d02249d2b55c15a
Code Sign
7e:93:eb:fb:7c:c6:4e:59:ea:4b:9a:77:d4:06:fc:3bCertificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before21/12/2012, 00:00Not After30/12/2020, 23:59SubjectCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
0e:cf:f4:38:c8:fe:bf:35:6e:04:d8:6a:98:1b:1a:50Certificate
IssuerCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USNot Before18/10/2012, 00:00Not After29/12/2020, 23:59SubjectCN=Symantec Time Stamping Services Signer - G4,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
76:25:a5:9e:a4:0a:7e:7b:91:3f:91:07:23:32:8e:26Certificate
IssuerCN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before04/06/2020, 00:00Not After04/06/2023, 23:59SubjectCN=win.rar GmbH,O=win.rar GmbH,POSTALCODE=10117,STREET=Marienstr. 12,L=Berlin,ST=Berlin,C=DEExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
39:72:44:3a:f9:22:b7:51:d7:d3:6c:10:dd:31:35:95Certificate
IssuerCN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before12/03/2019, 00:00Not After31/12/2028, 23:59SubjectCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
1d:a2:48:30:6f:9b:26:18:d0:82:e0:96:7d:33:d3:6aCertificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/11/2018, 00:00Not After31/12/2030, 23:59SubjectCN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
76:25:a5:9e:a4:0a:7e:7b:91:3f:91:07:23:32:8e:26Certificate
IssuerCN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before04/06/2020, 00:00Not After04/06/2023, 23:59SubjectCN=win.rar GmbH,O=win.rar GmbH,POSTALCODE=10117,STREET=Marienstr. 12,L=Berlin,ST=Berlin,C=DEExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
39:72:44:3a:f9:22:b7:51:d7:d3:6c:10:dd:31:35:95Certificate
IssuerCN=AAA Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before12/03/2019, 00:00Not After31/12/2028, 23:59SubjectCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
1d:a2:48:30:6f:9b:26:18:d0:82:e0:96:7d:33:d3:6aCertificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/11/2018, 00:00Not After31/12/2030, 23:59SubjectCN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
7b:05:b1:d4:49:68:51:44:f7:c9:89:d2:9c:19:9d:12Certificate
IssuerCN=VeriSign Universal Root Certification Authority,OU=VeriSign Trust Network+OU=(c) 2008 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before12/01/2016, 00:00Not After11/01/2031, 23:59SubjectCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7b:d4:e5:af:ba:cc:07:3f:a1:01:23:04:22:41:4d:12Certificate
IssuerCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before23/12/2017, 00:00Not After22/03/2029, 23:59SubjectCN=Symantec SHA256 TimeStamping Signer - G3,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
9c:66:96:14:0c:f3:61:be:84:1b:0f:4b:ea:3c:ad:de:9c:7d:83:fc:e4:45:63:45:74:6c:06:37:d3:d6:f1:16Signer
Actual PE Digest9c:66:96:14:0c:f3:61:be:84:1b:0f:4b:ea:3c:ad:de:9c:7d:83:fc:e4:45:63:45:74:6c:06:37:d3:d6:f1:16Digest Algorithmsha256PE Digest Matchestrue1d:57:cb:52:be:34:8e:9b:f0:e9:6c:f8:e2:d5:9e:a4:8b:73:fc:b8Signer
Actual PE Digest1d:57:cb:52:be:34:8e:9b:f0:e9:6c:f8:e2:d5:9e:a4:8b:73:fc:b8Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
D:\Projects\WinRAR\rar\build\rar64\Release\RAR.pdb
Imports
kernel32
GetCurrentProcess
DeviceIoControl
FindClose
SetFileTime
CloseHandle
BackupRead
BackupSeek
CreateDirectoryW
RemoveDirectoryW
CreateFileW
DeleteFileW
FindFirstFileW
CreateHardLinkW
GetShortPathNameW
GetLongPathNameW
MoveFileW
ReadFile
FlushFileBuffers
SetEndOfFile
SetFilePointer
GetFileTime
GetCurrentProcessId
GetDriveTypeW
GetDiskFreeSpaceExW
SetFileAttributesW
GetFileAttributesW
GetVolumeInformationW
ExpandEnvironmentStringsW
FindNextFileW
GetVersionExW
GetModuleFileNameW
GetCurrentDirectoryW
GetFullPathNameW
FoldStringW
SetErrorMode
FreeLibrary
LoadLibraryW
LoadLibraryExW
CompareStringA
GetCurrentThread
SetThreadPriority
SetThreadExecutionState
SetConsoleCtrlHandler
GetSystemDirectoryW
SetCurrentDirectoryW
GetFullPathNameA
SetPriorityClass
GetProcessAffinityMask
CreateThread
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
WaitForSingleObject
CreateSemaphoreW
GetSystemTime
SystemTimeToTzSpecificLocalTime
TzSpecificLocalTimeToSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
LocalFileTimeToFileTime
FileTimeToSystemTime
GetCPInfo
IsDBCSLeadByte
MultiByteToWideChar
WideCharToMultiByte
CompareStringW
SetFilePointerEx
GetProcessHeap
HeapSize
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FormatMessageW
Sleep
GetLastError
WriteConsoleW
ReadConsoleW
SetConsoleMode
GetConsoleMode
WriteFile
GetStdHandle
GetFileType
GetCommandLineW
GetModuleHandleW
GetProcAddress
GetFileInformationByHandle
CreateEventW
SetLastError
SetStdHandle
GetConsoleCP
LCMapStringW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
RaiseException
RtlUnwindEx
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
ExitProcess
GetModuleHandleExW
QueryPerformanceFrequency
GetModuleFileNameA
GetCommandLineA
GetACP
HeapFree
HeapAlloc
HeapReAlloc
GetStringTypeW
user32
CharLowerW
CharUpperW
MessageBeep
ExitWindowsEx
LoadStringW
OemToCharBuffW
CharToOemBuffA
OemToCharBuffA
OemToCharA
CharToOemA
CharToOemBuffW
advapi32
FreeSid
AllocateAndInitializeSid
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
LookupPrivilegeValueW
GetFileSecurityW
SetFileSecurityW
GetSecurityDescriptorLength
AdjustTokenPrivileges
OpenProcessToken
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
CheckTokenMembership
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetMalloc
SHFileOperationW
powrprof
SetSuspendState
Sections
.text Size: 443KB - Virtual size: 442KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Soul_stealer-main/Soul Stealer/Components/rarreg.key
-
Soul_stealer-main/Soul Stealer/Components/requirements.txt
-
Soul_stealer-main/Soul Stealer/Components/run.bat.bat .vbs
-
Soul_stealer-main/Soul Stealer/Components/sigthief.py.py .sh linux
-
Soul_stealer-main/Soul Stealer/Components/stub.py
-
Soul_stealer-main/Soul Stealer/Components/upx.exe.exe windows:4 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 522KB - Virtual size: 524KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 850KB - Virtual size: 849KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
Soul_stealer-main/Soul Stealer/Components/version.txt
-
Soul_stealer-main/Soul Stealer/Extras/hash
-
Soul_stealer-main/Soul Stealer/Extras/icon.ico
-
Soul_stealer-main/Soul Stealer/Extras/unblock_sites.py
-
Soul_stealer-main/Soul Stealer/READme.txt
-
Soul_stealer-main/Soul Stealer/config.json
-
Soul_stealer-main/Soul Stealer/gui.py