This document analyzes the "machine.apk" Android malware sample using static and dynamic analysis techniques. The summary includes: 1. Static analysis is performed using tools like apktool, dex2jar, and jd-gui to disassemble the app and examine its AndroidManifest.xml and Java source code. This reveals the malware requests dangerous permissions like location, SMS/calls, and implements tapping and tracking services. 2. Dynamic analysis with CopperDroid and Anubis is able to monitor the app's network traffic and activity timeline. The analysis finds the app extracts the phone number and operator, sends this data to Thailand, can make automatic calls, and tracks the device location. 3.