Behaviors
List of software behaviors discovered with static code analysis.
Uses a Python script interpreter. (x3)
execution
Decodes hex or base64-encoded streams. (x1)
packer
Queries the value of an environment variable. (x1)
search
Converts binary data to its string representation, commonly used in obfuscation. (x1)
packer
Terminates a process/thread. (x5)
execution
Detects presence of debuggers. (x5)
evasion
Contains reference to kernel32.dll which is Windows NT BASE API Client DLL. (x1)
execution