This is very interesting. I have been scanning through a lot of these samples and this code seems to be very adaptive. Is there a way to get the source to potentially reverse engineer it for future ATM defense?
ThreatDetectors wrote: Is there a way to get the source to potentially reverse engineer it for future ATM defense?Do you mean potentially write a clone? :)