Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x3)
anomaly
Encodes data using the Base16 algorithm. (x3)
file
Decodes data using the Base16 algorithm. (x3)
file
Converts binary data to its string representation, commonly used in obfuscation. (x5)
packer
Serializes data into the JSON format. (x2)
file
Concatenates strings. (x12)
behavior
Generates cryptographically strong random values. (x3)
anomaly
Contains patterns identifying the constants related to the base64 binary-to-text encoding algorithm. (x4)
signature
Contains patterns identifying the constants related to the base64url binary-to-text encoding algorithm. (x3)
signature
Uses math functions. (x8)
behavior