Behaviors
List of software behaviors discovered with static code analysis.
Encodes data using the Base16 algorithm. (x5)
file
Contains URLs that use non-standard ports. (x2)
network
Contains URLs with suspicious path components. (x1)
network
Might monitor keystrokes. (x19)
steal
Enumerates the operating system platform. (x5)
search
Calculates the SHA-512 hash of data. (x2)
file
Queries the value of an environment variable. (x12)
search
Enumerates operating system version. (x2)
search
Converts binary data to its string representation, commonly used in obfuscation. (x18)
packer
Contains the ZWSP (zero width space) Unicode character. (x224)
anomaly