This presentation will introduce the basics steps of carrying out static and dynamic analysis on malware using disassemblers, debuggers, and other tools. Diving into the dark waters of dissecting malware will allow the audience to understand how to disassemble malware, identify key strings and process, and track the behavioral triggers once placed in a sandbox. It also highlights the limitation of static analysis and hints at the next phases of analyzing an obfuscated malware. The audience will be able to develop basic SNORT and YARA rule based on the information shared. Some resources on Android Malware and Linux Malware analysis have been added as a bonus.