Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x3)
anomaly
Contains URLs that use suspicious top-level domains. (x3)
network
Contains IP addresses. (x4)
network
Contains URLs. (x3)
network
Contains an uninterrupted sequence of Unicode-escaped characters. (x3)
evasion
Converts binary data to its string representation, commonly used in obfuscation. (x8)
packer
Contains the ZWNJ (zero width non-joiner) Unicode character. (x2)
anomaly
Splits a string using a regular expression. (x8)
behavior
Replaces a substring in a string using a regular expression. (x9)
behavior
Creates a regular expression. (x11)
behavior