Is this real
Photo by Paweł Czerwiński / Unsplash

"If a malware aware that it's being deployed in a  honeypot environment, can it consider itself to be sentient ?"

Traditionally in the past , in order to avoid a payload from being easily dissected by malware researchers, obsfucation , anti-vm , anti debugging technique will be use as a show stopper.

If you are interested to learn common techniques how  VM detection works there are two seperate projects


Sample Results


Enumerate 5 major Information to Detect for VM

We will discuss some common techniques that can be use to evade the detection in part 2.