The mobile platform is growing in popularity and these devices are taking over some of the functionality that desktop and laptop computers have traditionally performed in the past. Nowadays, it is easier to use an application to access your bank account information than it is to sit down and login via a more traditional laptop or desktop. It should not be surprising to anyone that as a particular platform becomes more popular, it becomes a higher value target to threat actors. Sitting on the cusp of a mobile revolution means that threat actors will begin to use more complex attacks to attempt to hijack mobile platforms. We will review some of the source code related to various malware families along with the functionality that each family posses. Time permitting we will walk through an in depth analysis of a simple neutered android trojan.