Behaviors
List of software behaviors discovered with static code analysis.
Writes data to the hosts file. (x5)
stealth
Reads data from files containing SSL certificates installed on the system. (x5)
steal
Accesses /etc/group file. (x2)
file
Reads data from the hosts file. (x5)
search
Sends or exfiltrates data over the network. (x10)
network
Tampers with DNS configuration. (x5)
network
Writes data to the Name Service Switch (NSS) configuration file. (x5)
network
Receives data over the network. (x10)
network
Writes data to the /etc/host.conf file, which contains configuration information specific to the resolver library. (x5)
network
Writes data to files containing SSL certificates installed on the system. (x5)
file