EDIT: Here is some more background. I am basically trying to reproduce this the method outlined here I have been able to hit everything up until the paragraph regarding the decrypting of the data file in the raw folder. That site pretty much outlines everything.
The file was encrypted using a random number via the java random number generator. The random number was generated via a seed (located in the manifest file). I tracked down the seed and built a random number generator. I fed it the seed which supplied me with the key for the encrypted file in the raw folder.
Now I am left with they key to an encrypted file, however I am unfamiliar with decrypting a file in this fashion. That is my question. In what way would one go about decrypting a file that was encrypted in this manner.
Is it done with a software tool, or can it be done via the linux terminal?
@Gilles
Unfortunately I am not that advanced in computer forensics (but you can tell I'm attempting to learn)
Here is the output of hexdump from the terminal.
0000000 5194 1748 f896 bd6c fdf9 0d72 617e 7714
0000010 2221 4b77 a96b d327 1e2a 67d7 6e91 1720
0000020
Here is what shows up when I open the file with a text editor.
QHølœùýr
~aw!"wKk©'Ó*×gn