Behaviors
List of software behaviors discovered with static code analysis.
Modifies file/directory permissions. (x3)
permissions
Changes file ownership. (x3)
file
Might contain potentially obfuscated code or data. (x2)
anomaly
Decrypts data using RSA with a given private key. (x2)
packer
Decrypts data using ChaCha20 cipher. (x2)
packer
Decrypts data using Advanced Encryption Standard (AES). (x2)
packer
Encrypts data using RSA with a given private key. (x2)
packer
Decrypts data using RSA with a given public key. (x2)
packer
Encodes data using the Base64 algorithm. (x4)
packer
Encrypts data using ChaCha20 cipher. (x2)
packer