Deep dive into a malicious Android RAT using a dropper technique, runtime decryption, and dual C2 communication paths.