GET /api/techniques/24/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 24,
    "key": "vmcpuid",
    "unprotect_id": "U1322,B0009.037",
    "name": "VMCPUID",
    "description": "The VMCPUID instruction is a sophisticated mechanism often employed by malware to ascertain if it is operating within a virtual environment.\r\n\r\nThis instruction is part of the x86 architecture's virtual machine extensions (VMX) and is designed to provide information about the capabilities and status of the virtual machine. \r\n\r\nBy using VMCPUID, malware can adapt its behavior based on the context in which it is running, thus adding an additional layer of complexity to its detection and mitigation. Essentially, it serves as a telltale indicator, aiding malware in identifying virtualization-based security measures or sandboxing environments",
    "resources": "https://www.cert.pl/en/news/single/necurs-hybrid-spam-botnet/",
    "creation_date": "2019-03-11T08:09:24Z",
    "tags": "VMCPUID, instruction, malware, detection, virtual environment, x86 architecture",
    "modification_date": "2023-10-04T10:42:06.356000Z",
    "category": [
        1
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [],
    "contributors": []
}