This document discusses automatic Android malware analysis. It begins with introductions to Android application fundamentals like application components and intents. It then discusses the APK file format and Dex file format. It covers static analysis using the Androguard tool to extract information from APKs. It also covers dynamic analysis using the CuckooDroid tool and discusses fixes needed for it to work with newer Android versions. It explores techniques for emulator evasion/detection and discusses using Frida for instrumentation. The conclusion discusses areas for future work like integrating Frida with CuckooDroid and improving emulator performance and Android support.