There are few data elements that are unique to an emulated Android environment. Below are few checks that the malware does and the default values for an emulator:

Build.FINGERPRINT.startsWith "generic" or "unknown"Build.MODEL.contains "google_sdk" or "Emulator" or "Android SDK built for x86"Build.MANUFACTURER.contains "Genymotion"Build.BRAND.startsWith "generic"Build.DEVICE.startsWith "generic"Build.HARDWARE.contains "golfdish" or "ranchu"Build.PRODUCT equals "google_sdk" or "sdk_x86" or "vbox86p" or "generic"IMEI = 000000000000000, 012345678912345 or 004999010640000IMSI = 012345678912345NetworkOperatorName is emptySimOperatorName is empty

SonicWall Security Center

更多相关文章

  1. 代码中设置drawableleft
  2. android 3.0 隐藏 系统标题栏
  3. Android开发中activity切换动画的实现
  4. Android(安卓)学习 笔记_05. 文件下载
  5. Android中直播视频技术探究之—摄像头Camera视频源数据采集解析
  6. 技术博客汇总
  7. android 2.3 wifi (一)
  8. AndRoid Notification的清空和修改
  9. Android中的Chronometer

随机推荐

  1. android webview增加下载附件功能
  2. WebRTC --- Chrome Android平台上的硬件
  3. Android 之屏蔽,捕获Home键
  4. Android版本检测与更新
  5. android之ArrayAdaper应用
  6. android软键盘的隐藏
  7. Android 控件最上层显示方法
  8. android 对话框中的进度条 (ProgressDial
  9. android:通过选择相册或者拍照获取照片
  10. Android(安卓)studio build.gradle 各种