{"id":7334,"date":"2017-04-13T07:50:00","date_gmt":"2017-04-13T15:50:00","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/13\/news-1125\/"},"modified":"2017-04-13T07:50:00","modified_gmt":"2017-04-13T15:50:00","slug":"news-1125","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/04\/13\/news-1125\/","title":{"rendered":"Android malware anti-emulation techniques"},"content":{"rendered":"<p><strong>Credit to Author: Bill Brenner| Date: Thu, 13 Apr 2017 15:35:54 +0000<\/strong><\/p>\n<p><img decoding=\"async\" data-attachment-id=\"32325\" data-permalink=\"https:\/\/blogs.sophos.com\/2016\/10\/20\/exploring-the-popularity-and-applications-of-document-exploit-builder-ancalog\/sophoslabs-2\/#main\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2016\/10\/sophoslabs.png?w=640\" data-orig-size=\"150,150\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"sophoslabs\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2016\/10\/sophoslabs.png?w=640?w=150\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2016\/10\/sophoslabs.png?w=640?w=150\" src=\"https:\/\/sophos.files.wordpress.com\/2016\/10\/sophoslabs.png?w=640\" alt=\"\"   class=\"alignleft size-full wp-image-32325\" \/><em>The following report is by SophosLabs Android specialist\u00a0<span class=\"s1\">Chen Yu, with support from Android team members William Lee, Jagadeesh Chandraiah and\u00a0Ferenc L\u00e1szl\u00f3 Nagy.<\/span><\/em><\/p>\n<p class=\"p1\"><span class=\"s1\">As the amount of Android malware grows, it follows every step of its Windows counterparts when it comes to techniques\u00a0used to evade emulators used for dynamic analysis.<\/span><\/p>\n<p><span id=\"more-33291\"><\/span><\/p>\n<p class=\"p1\">In this blog post, we&#8217;ll\u00a0show some of those anti-emulator techniques.<\/p>\n<p class=\"p1\">An emulator\u00a0is hardware or software that allows\u00a0one computer (the host) to imitate\u00a0another computer (the guest). It\u00a0typically allows\u00a0the host system to run software or use peripheral devices designed for the guest system. In security, it&#8217;s a handy way to test malware behavior &#8212; which is why the malware creators want to disrupt it.<\/p>\n<p class=\"p1\">Anti-emulation techniques are found in many different Android malware families, one being\u00a0the recent Android Adload adware found in Google Play.<\/p>\n<p class=\"p1\">With that, here are six common anti-emulator techniques SophosLabs discovered:<\/p>\n<p class=\"p1\"><strong><span class=\"s1\">1.<\/span><span class=\"s2\">\u00a0C<\/span><span class=\"s1\">heck telephony services information<\/span><\/strong><\/p>\n<p class=\"p1\"><span class=\"s1\">Emulator detecting\u00a0is all about spotting the difference between the environment that the emulator and real device provide. Firstly, the\u00a0deviceID, phone number, IMEI, and IMSI would be different on an emulator than on a real device. The\u00a0<i>Android.os<\/i><\/span><span class=\"s3\"><i>.<\/i><\/span><span class=\"s1\"><i>TelephonyManager<\/i>\u00a0class provides methods to get the information. Applications can use the methods in this class to determine telephony services and states, and access some types of subscriber information, and register a listener to receive notification of telephony state changes. For example, it can use\u00a0<i>getLine1Number<\/i><\/span><span class=\"s4\"> to get the phone number on line 1. On an emulator, it would be 1555521 with emulator\u2019s port number. If the port number is 5554<\/span><span class=\"s5\">, t<\/span><span class=\"s4\">he return value will be 15555215554.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Andr\/RuSms-AT uses this code to detect the emulator:<\/span><\/p>\n<p class=\"p3\"><a href=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-10-42-am.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"33292\" data-permalink=\"https:\/\/blogs.sophos.com\/2017\/04\/13\/android-malware-anti-emulation-techniques\/screen-shot-2017-04-12-at-8-10-42-am\/#main\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-10-42-am.png\" data-orig-size=\"1968,482\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2017-04-12 at 8.10.42 AM\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-10-42-am.png?w=948&#038;h=231\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-10-42-am.png?w=640\" class=\"wp-image-33292 alignleft\" src=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-10-42-am.png?w=948&#038;h=231\" alt=\"\" width=\"948\" height=\"231\" srcset=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-10-42-am.png?w=943&amp;h=231 943w, https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-10-42-am.png?w=1886&amp;h=462 1886w, https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-10-42-am.png?w=150&amp;h=37 150w, https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-10-42-am.png?w=300&amp;h=73 300w, https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-10-42-am.png?w=768&amp;h=188 768w, https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-10-42-am.png?w=1024&amp;h=251 1024w\" sizes=\"auto, (max-width: 948px) 100vw, 948px\" \/><\/a><\/p>\n<p class=\"p3\"><strong><span class=\"s1\">\u00a0<\/span><\/strong><\/p>\n<p class=\"p3\"><strong><span class=\"s1\">2<\/span><\/strong><strong><span class=\"s1\">.<\/span><span class=\"s2\">\u00a0\u00a0<\/span><span class=\"s1\">Check build info<\/span><\/strong><\/p>\n<p class=\"p2\"><span class=\"s1\">We\u2019ve found multiple malware families checking the build info to determine if it\u2019s running on an emulator.\u00a0<\/span><span class=\"s1\">For example, this banker malware has the following anti-emulator code (click to enlarge):<\/span><\/p>\n<p class=\"p2\"><a href=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"33293\" data-permalink=\"https:\/\/blogs.sophos.com\/2017\/04\/13\/android-malware-anti-emulation-techniques\/unknown-2\/#main\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown.png\" data-orig-size=\"1488,189\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Unknown\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown.png?w=919&#038;h=116\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown.png?w=640\" class=\"wp-image-33293 alignleft\" src=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown.png?w=919&#038;h=116\" alt=\"\" width=\"919\" height=\"116\" srcset=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown.png?w=913&amp;h=116 913w, https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown.png?w=150&amp;h=19 150w, https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown.png?w=300&amp;h=38 300w, https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown.png?w=768&amp;h=98 768w, https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown.png?w=1024&amp;h=130 1024w, https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown.png 1488w\" sizes=\"auto, (max-width: 919px) 100vw, 919px\" \/><\/a><\/p>\n<p class=\"p2\"><span class=\"s1\">The strings are encrypted. After decrypting, it\u2019s checking this:\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>ctx.getSystemService(&#8220;phone&#8221;).getDeviceId().equals(&#8220;000000000000000&#8221;)<\/i><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Build.MODEL.contains(&#8220;google_sdk&#8221;)<\/i><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Build.MODEL.contains(&#8220;Emulator&#8221;)<\/i><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Build.MODEL.contains(&#8220;Android SDK&#8221;)<\/i><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Build.FINGERPRINT.startsWith(&#8220;generic&#8221;)<\/i><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Build.FINGERPRINT.startsWith(&#8220;unknown&#8221;)<\/i><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Build.MODEL.contains(&#8220;Android SDK built for x86&#8221;)<\/i><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Build.MANUFACTURER.contains(&#8220;Genymotion&#8221;)<\/i><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Build.BRAND.startsWith(&#8220;generic&#8221;) &amp;&amp;\u00a0Build.DEVICE.startsWith(&#8220;generic&#8221;)<\/i><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The function above is called by a broadcast receiver. In the app manifest, this receiver is defined to receive\u00a0<i>android.intent.action.BOOT_COMPLETED<\/i> and <i>android.intent.action.SCREEN_ON<\/i>. That means it\u2019s called every time the phone is booted and awoken\u00a0from sleep. It\u2019s a common place for malware to launch their malicious actions. But as showed below, this malware won\u2019t do anything if the emulator checking function returns &#8220;True.&#8221;<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">\u00a0<a href=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-25-30-am.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"33299\" data-permalink=\"https:\/\/blogs.sophos.com\/2017\/04\/13\/android-malware-anti-emulation-techniques\/screen-shot-2017-04-12-at-8-25-30-am\/#main\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-25-30-am.png\" data-orig-size=\"836,366\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2017-04-12 at 8.25.30 AM\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-25-30-am.png?w=637&#038;h=278\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-25-30-am.png?w=640\" class=\" wp-image-33299 aligncenter\" src=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-25-30-am.png?w=637&#038;h=278\" alt=\"\" width=\"637\" height=\"278\" srcset=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-25-30-am.png?w=635&amp;h=278 635w, https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-25-30-am.png?w=150&amp;h=66 150w, https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-25-30-am.png?w=300&amp;h=131 300w, https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-25-30-am.png?w=768&amp;h=336 768w, https:\/\/sophos.files.wordpress.com\/2017\/04\/screen-shot-2017-04-12-at-8-25-30-am.png 836w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/a><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0<\/span><strong><span class=\"s1\">3.<\/span><span class=\"s2\">\u00a0\u00a0<\/span><span class=\"s1\">Check system properties<\/span><\/strong><\/p>\n<p class=\"p2\"><span class=\"s1\">Another way is to check system properties. Some system properties on an emulator are different from those on real devices. For example, device brand, hardware and model.\u00a0<\/span><span class=\"s1\">This table shows\u00a0some of the\u00a0system property values on an emulator:<\/span><\/p>\n<table class=\"t1\" width=\"1308.0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">Property<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">Value indicates emulator<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">ro.bootloader<\/span><\/p>\n<\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">Unknown<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">ro.bootmode<\/span><\/p>\n<\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">Unknown<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">ro.hardware<\/span><\/p>\n<\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">Goldfish<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">ro.product.model<\/span><\/p>\n<\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">Sdk<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">ro.product.device<\/span><\/p>\n<\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">Generic<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td3\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">ro.product.name<\/span><\/p>\n<\/td>\n<td class=\"td4\" valign=\"middle\">\n<p class=\"p8\"><span class=\"s1\">Sdk<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"p2\"><span class=\"s1\">\u00a0<\/span><strong><span class=\"s1\">4.<\/span><span class=\"s2\">\u00a0\u00a0<\/span><span class=\"s1\">Check presence of emulator related files.<\/span><\/strong><\/p>\n<p class=\"p2\"><span class=\"s1\">This is another technique found in malware samples. They check if QEMU (Quick Emulator) or other emulator-related files exist. For example this piece of code is found in a Andr\/Pornclk variant.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u00a0<a href=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown-1.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"33300\" data-permalink=\"https:\/\/blogs.sophos.com\/2017\/04\/13\/android-malware-anti-emulation-techniques\/unknown-1\/#main\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown-1.png\" data-orig-size=\"808,348\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Unknown-1\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown-1.png?w=888&#038;h=382\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown-1.png?w=640\" class=\"alignnone wp-image-33300\" src=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown-1.png?w=888&#038;h=382\" alt=\"\" width=\"888\" height=\"382\" srcset=\"https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown-1.png 808w, https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown-1.png?w=150&amp;h=65 150w, https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown-1.png?w=300&amp;h=129 300w, https:\/\/sophos.files.wordpress.com\/2017\/04\/unknown-1.png?w=768&amp;h=331 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/><\/a><\/span><\/p>\n<p class=\"p2\"><strong><span class=\"s1\">5.<\/span><span class=\"s2\">\u00a0<\/span><span class=\"s1\">Check debugger and installer<\/span><\/strong><\/p>\n<p class=\"p9\"><span class=\"s6\">This one is not an anti-emulator but its\u00a0purpose is\u00a0also to obstruct the dynamic analysis. Like this skinner adware reported by\u00a0<a href=\"http:\/\/%20http\/blog.checkpoint.com\/2017\/03\/08\/skinner-adware-rears-ugly-head-google-play\/\"><span class=\"s7\">checkpoint<\/span><\/a>, it uses\u00a0<\/span><span class=\"s8\"><i>Debug.isDebuggerConnected()<\/i><\/span><span class=\"s9\"><i> <\/i>and<i>\u00a0<\/i><\/span><span class=\"s8\"><i>Debug.waitingForDebugger()<\/i><\/span><span class=\"s9\"><i>\u00a0<\/i><\/span><span class=\"s1\">to check if a debugger exists. More interesting, it also gets the installer using\u00a0<\/span><span class=\"s8\"><i>getInstallerPackageName<\/i><\/span><span class=\"s1\">\u00a0and sees if it\u2019s installed by Google Play (<\/span><span class=\"s8\"><i>com.android.vending<\/i><\/span><span class=\"s9\">)<i>.\u00a0<\/i>So<i>\u00a0<\/i><\/span><span class=\"s1\">if you install\u00a0the program to a device\u00a0with adb, like most analysts do, the application won&#8217;t<\/span> <span class=\"s6\">work.<\/span><\/p>\n<p class=\"p10\"><strong><span class=\"s1\">\u00a0<\/span><span class=\"s1\">6. Time bomb<\/span><\/strong><\/p>\n<p class=\"p2\"><span class=\"s1\">This is another way many malware\/adware families hide themselves from dynamic analysis. After installation, they await a certain time until they start their activities. For example, the configuration file below has been seen in an adware sample:<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0 &#8220;settings&#8221;: {<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0\u00a0\u00a0 &#8220;adDelay&#8221;: 180000,<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0\u00a0\u00a0 &#8220;firstAdDelay&#8221;: 86400000,<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0\u00a0\u00a0 &#8220;unlockDelay&#8221;: 2,<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0\u00a0\u00a0 &#8220;bannerDelay&#8221;: 180000,<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0\u00a0\u00a0 &#8220;bannerPreDelay&#8221;: 10000,<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0\u00a0\u00a0 &#8220;bannersPerDay&#8221;: 25<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">},<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>firstAdDelay<\/i> is the millisecond until the first advertisement is delivered, 24 hours in this case. This can prevent the user from getting suspicious as well.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">We believe Android malware and adware writers will continue to weave anti-emulation techniques into their code, as they have had a fair degree of success in doing so thus far. Security companies must match them with better detection methods.<\/span><\/p>\n<p class=\"p1\"><strong><span class=\"s1\">Reference:<\/span><\/strong><\/p>\n<p class=\"p13\"><span class=\"s11\"><a href=\"https:\/\/github.com\/strazzere\/anti-emulator\">https:\/\/github.com\/strazzere\/anti-emulator<\/a><\/span><\/p>\n<p class=\"p13\"><span class=\"s11\"><a href=\"http:\/\/blog.checkpoint.com\/2017\/03\/08\/skinner-adware-rears-ugly-head-google-play\/\">http:\/\/blog.checkpoint.com\/2017\/03\/08\/skinner-adware-rears-ugly-head-google-play\/<\/a><\/span><\/p>\n<p>Filed under: <a href='https:\/\/blogs.sophos.com\/category\/corporate\/'>Corporate<\/a>, <a href='https:\/\/blogs.sophos.com\/category\/sophoslabs\/'>SophosLabs<\/a> Tagged: <a href='https:\/\/blogs.sophos.com\/tag\/android\/'>Android<\/a>, <a href='https:\/\/blogs.sophos.com\/tag\/malware\/'>malware<\/a>, <a href='https:\/\/blogs.sophos.com\/tag\/sophoslabs\/'>SophosLabs<\/a> <br \/><a href=\"http:\/\/feedproxy.google.com\/~r\/sophos\/dgdY\/~3\/j5-8ZOuMSro\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Bill Brenner| Date: Thu, 13 Apr 2017 15:35:54 +0000<\/strong><\/p>\n<p>The following report is by SophosLabs Android specialist\u00a0Chen Yu, with support from Android team members William Lee, Jagadeesh Chandraiah and\u00a0Ferenc L\u00e1szl\u00f3 Nagy. As the amount of Android malware grows, it follows every step of its Windows counterparts when it comes to techniques\u00a0used to evade emulators used for dynamic analysis. In this blog post, we&#8217;ll\u00a0show some [&#8230;]<img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=blogs.sophos.com&#038;blog=834173&#038;post=33291&#038;subd=sophos&#038;ref=&#038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10462,10379,3764,10383],"class_list":["post-7334","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-android","tag-corporate","tag-malware","tag-sophoslabs"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7334"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7334\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7334"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}