Behaviors
List of software behaviors discovered with static code analysis.
Decrypts data using RSA with a given private key. (x2)
packer
Encrypts data using RSA with a given public key. (x2)
packer
Creates a process. (x2)
execution
Contains URLs that use suspicious top-level domains. (x2)
network
Contains IP addresses. (x2)
network
Contains URLs related to URL shortener services. (x1)
network
Calculates the MD5 hash of data. (x2)
file
Queries the value of an environment variable. (x10)
search
Converts binary data to its string representation, commonly used in obfuscation. (x2)
packer
Writes to files. (x2)
file