We have presented an automated method for extracting familial signatures for Android malware and a method to detect the malware in any Android app. Our results for detecting Android malware are comparable to other current works and, to the best of our knowledge, we introduce the first method for automated familial classification of Android APKs. Our method is insensitive to many obfuscations used by Android malware. More work needs to be done for addressing other obfuscations. In spite of these limitations, the method is still valuable since it raises the bar for malware authors, pushing them into using more difficult and expensive obfuscations.