You can find the OEP by looking for the tail jump. Step over a few functions, and you will see a tail jump consisting of a jmp eax
followed by many 0x00 bytes.
Petite also keeps at least one import from each library in the original import table. Although this does not affect how difficult it is to unpack, you can easily determine which DLLs the malware uses without unpacking it.