Behaviors
List of software behaviors discovered with static code analysis.
Encodes data using the Base16 algorithm. (x1)
file
Contains IP addresses. (x1)
network
Might evaluate code dynamically. (x1)
anomaly
Might monitor keystrokes. (x1)
steal
Makes HTTP GET requests. (x1)
network
Contains URLs that reference the host by IP address. (x1)
network
Calculates the SHA-1 hash of data. (x2)
file
Converts binary data to its string representation, commonly used in obfuscation. (x1)
packer
Executes commands in command line. (x2)
execution
Might create additional elements programmatically. (x1)
document