Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x3)
anomaly
Contains URLs that link to interesting file formats. (x1)
network
Encodes data using the Base16 algorithm. (x2)
file
Might evaluate code dynamically. (x2)
anomaly
Might monitor keystrokes. (x2)
steal
Contains an uninterrupted sequence of Unicode-escaped characters. (x2)
evasion
Contains Unicode-escaped characters that are otherwise printable. (x2)
evasion
Converts binary data to its string representation, commonly used in obfuscation. (x5)
packer
Might access or change current URL (location). (x2)
network
Contains URLs related to search engines. (x2)
network