At this stage, we have enough knowledge to start analyzing actual malware. For static analysis, the process and tools used will be mostly the same for different versions of the Android OS (regardless of whether it is based on the older Dalvik VM or newer ART technology); the differences will be in the dynamic analysis techniques used. Now it is time to get our hands dirty and become familiar with instruments that can facilitate this process.
Static and dynamic analysis of threats
Static analysis
Generally, static analysis of bytecode malware involves either disassembling them and digging into the bytecode instructions or decompiling to the original language and exploring the source code. In many cases, the latter approach...