robemtnez wrote:Upatre was the one checking for CPU numbers and not Dyre, and I understand it was a feature of the packer and not the malware itself.I think the total number of Upatre and Dyre samples you have reversed is 0.
A forum for reverse engineering, OS internals and malware analysis
robemtnez wrote:Upatre was the one checking for CPU numbers and not Dyre, and I understand it was a feature of the packer and not the malware itself.I think the total number of Upatre and Dyre samples you have reversed is 0.
robemtnez wrote:Upatre was the one checking for CPU numbers and not Dyre, and I understand it was a feature of the packer and not the malware itself.Have you ever opened this malware in anything before doing this post?
patriq wrote:I do believe it is a part/sort of antiemulation, just like empty WriteConsoleW before.Xylitol wrote: https://www.youtube.com/watch?v=hKkmQ3tGJa0is GetSystemPowerStatus used to test for sandbox/vm?