open the virtual machine with the command prompt find the "C:\Users\sicurezza\Desktop\tool" folder run java -jar Bytecode-Viewer-2.9.22.jar open the 00ceaa5f8f9be7a9ce5ffe96b5b6fb2e7e73ad87c2f023db9fa399c40ac59b62.apk file in the "C:\Users\sicurezza\workspace\CCS" folder let us explore the malware :) open eclipse open the plankton.mu file in the folder "C:\Users\sicurezza\workspace\CCS\" paste following code: prop P = (min X = P1 \/ <-pushActivation>X) prop P1 = (min X = tt \/ <-pushHomepage>X) click the RUN button (the green icon) to run LEILA select File select Open choose the app in the "C:\Users\sicurezza\workspace\CCS\malwareToTest" folder select Analysis - Run - Family Identification - Plankton