Behaviors
List of software behaviors discovered with static code analysis.
Writes data to the hosts file. (x3)
stealth
Reads data from files containing SSL certificates installed on the system. (x2)
steal
Contains URLs that link to raw files on GitHub. (x3)
network
Listens on incoming network connections. (x1)
network
Reads data from the hosts file. (x3)
search
Opens registry keys. (x2)
registry
Enumerates registry keys. (x2)
registry
Enumerates the values of a registry key. (x2)
registry
Sends or exfiltrates data over the network. (x8)
network
Writes data to the /etc/host.conf file, which contains configuration information specific to the resolver library. (x2)
network