This document provides an introduction to static analysis techniques for malware analysis. It begins with an overview of static analysis and the information that can be gleaned without executing code, such as file structure, binary code, related modules, and suspicious strings. Common Linux tools for static analysis like strings, file, hexdump, and objdump are introduced. Disassembly, the process of converting binary machine code to assembly code, is explained. Reverse engineering disassembled code back into C code involves understanding variables, data movement, arithmetic, control flow, functions, and calling conventions. The document concludes by introducing IDA Pro as a popular disassembler and decompiler tool for static analysis.