Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x3)
anomaly
Encodes data using the Base16 algorithm. (x2)
file
Contains IP addresses. (x1)
network
Enumerates the operating system platform. (x2)
search
Deletes a file/directory. (x1)
file
Converts binary data to its string representation, commonly used in obfuscation. (x5)
packer
Copies a file/directory. (x1)
file
Executes commands in command line. (x2)
execution
Might create additional elements programmatically. (x2)
document
Concatenates strings. (x6)
behavior