This document summarizes a technical workshop on analyzing the Win32/Georbot malware. The workshop covers obfuscation techniques used like data obfuscation, control flow obfuscation and API call obfuscation. It also analyzes the malware's command and control protocol and discusses how to deobfuscate and better understand the malware using IDA Python and debugging tools. The objectives are to gain hands-on experience analyzing an actual malware sample and understand common obfuscation and persistence techniques seen in the wild.