You will get a Malware forensic Investigation of a Malicious Program

Stephen K.
Stephen K. Stephen K.
4.7
Top Rated

Let a pro handle the details

Buy Assessments & Penetration Testing services from Stephen, priced and ready to go.

You will get a Malware forensic Investigation of a Malicious Program

Stephen K.
Stephen K. Stephen K.
4.7
Top Rated

Select service tier

Malware Insight

Identify malware family, Static analysis, API calls & Network traffic analysis

  • Delivery Time 7 days
    • Cost Estimation
7 days delivery — Sep 17, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Stephen gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Stephen, priced and ready to go.

Project details

Objectives of malware analysis:

1. To understand the type of malware and the entire scope of what it can do (functionality). Is it a Keylogger, RAT or Ransomware?
2. How the system was infected with the malware. Is it a targeted attack or a phishing attack?
3. How it communicates with the attacker.
4. To exfiltrate useful indicators like registry entries/keys and filenames to generate signatures that can be used to detect future detection.
Cybersecurity Assessment Type
Compromise Assessment
Cybersecurity Expertise
Data Protection, Cyber Threat Intelligence, Cybersecurity Awareness
Technology Type
Computer Network, Operating System, Mobile Device
What's included
Service Tiers Starter
$500
Standard
$1,000
Advanced
$1,500
Delivery Time 7 days 10 days 21 days
Application Audit
-
Project Plan
-
Cost Estimation
-

Frequently asked questions

4.7
62 reviews
82% Complete
15% Complete
1% Complete
(0)
2% Complete
2% Complete
Rating breakdown
Availability
4.7
Deadlines
4.6
Skills
4.8
Cooperation
4.8
Quality
4.7
Communication
4.7

BB

Brittany B.
5.00
Aug 13, 2024
Website Recovery Help Incredibly skilled in this area. I seemed Stephen's help with trying to access a domain of mine which was hacked. He went above and beyond to provide detailed information and I learnt a lot from him. Highly recommend!

KN

Khuz N.
5.00
Jul 29, 2024
Investigation and Education awareness

SM

Susie M.
5.00
Jul 15, 2024
Examination of Horse Video and Purchased Horse I recently worked with Stephen, a highly skilled Digital Forensic expert, and I can't recommend his services enough. Stephen's expertise and professionalism were evident from the start. He took a grainy, low-quality video I provided and used advanced tools to enhance it, extracting crucial evidence.

Stephen’s thorough and meticulous investigation ensured no detail was overlooked. His methodical approach and keen analytical skills were essential in identifying key evidence for our case. His integrity and objective mindset ensured reliable and accurate findings.

Overall, Stephen expertise in analyzing low-quality video was crucial to our case's success. I highly recommend Stephen to anyone needing a top-tier Digital Forensic expert.

GK

Girish K.
4.30
Jun 18, 2024
Instagram vanish mode message recovery & evidence report

KN

Khuz N.
5.00
Jun 7, 2024
Malware Analysis Peer to Peer Botnet
Stephen K.

About Stephen

Stephen K.
Cyber Security | Ethical Hacker| Digital Forensics Investigator
98% Job Success
4.7  (62 reviews)
Nairobi, Kenya - 11:55 pm local time
Hello,
I am a dedicated professional with extensive experience in Cyber Investigations, Cyber Intelligence, Cyber Operations, Cybersecurity, and Information Security. I excel in implementing effective security strategies and mitigating potential cyber threats. My expertise lies in detecting, investigating, and mitigating cyber threats while providing strategic insights to enhance organizational cyber defense capabilities.

My Expertise are;

✅ Dark Web Cyber Threat Intelligence, Fraud Investigation, Criminal Profiling, Company OSINT Investigations
✅ Malware Reverse Engineering and Disassembly
✅ WordPress Malware Removal & Hacked Website Recovery
✅ Digital Forensics (Data Recovery and Analysis, Mobile Device Forensics (iPhone & Android), Network Forensics, Email Header Analysis)
✅ Network Security: Firewall (pfsense,), IDS/IPS (Snort and Suricata), OpenVPN Access Server, SIEM (Wazuh), Web Proxy (Squid)
✅ Cyber Security Articles: Technical Writing, Blog Writing, Article Writing, Research Reports, Scientific Reports, ebooks, and Blogs (Fluent in American or British English)
✅ Pcap File Analysis (Wireshark, Network Miner, Wireedit, Scapy, ParserCap)
✅ Phishing Simulation, Red Team Operations, Exploit Development


I currently hold the following certifications:

➡ Certified Ethical Hacking

➡ Certified Penetration Tester and Bug Bounty Hunter

➡ Autopsy Digital Forensics

➡ Cyber Triage Digital Forensics Incidence Response


My vision is to safeguard the world against cyber threats by providing innovative and robust cybersecurity solutions.

Steps for completing your project

After purchasing the project, send requirements so Stephen can start the project.

Delivery time starts when Stephen receives requirements from you.

Stephen works on your project following the steps below.

Revisions may occur after the delivery date.

Malware Sample

Client shares infected app or identified malware in system

Malware Analysis

Static, Dynamic, Behavioral and Code Analysis

Review the work, release payment, and leave feedback to Stephen.