Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x1)
anomaly
Might monitor keystrokes. (x2)
steal
Contains URLs. (x1)
network
Converts binary data to its string representation, commonly used in obfuscation. (x2)
packer
Splits a string using a regular expression. (x3)
behavior
Replaces a substring in a string using a regular expression. (x3)
behavior
Creates a regular expression. (x3)
behavior
Concatenates strings. (x2)
behavior
Might output messages to console. (x3)
anomaly
Contains patterns identifying the constants related to the SHA-256 hash function, from the SHA-2 hash family. (x2)
signature