You will get a Professional Malware Analysis, Disassembly & Reverse Engineering Report

4.4

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Adam, priced and ready to go.

You will get a Professional Malware Analysis, Disassembly & Reverse Engineering Report

4.4

Select service tier

Static Analysis

This includes analysis of the malware without detonation

  • Delivery Time 2 days
    • Small Company Size
2 days delivery — Jul 26, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Adam gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Adam, priced and ready to go.

Project details

The main objectives of the malware analysis process is to achieve the following:
1. The type of malware in question i.e ransomware, worm, trojan, RAT etc
2. The mode of entry/infection on the system. This answers the question of how it got into the system
3. Host-based and Network-based Indicators of Compromise (IOCs). Is it associated with any Command-and-Control infrastructure?
4. Attribution and how to prevent future infection.
Cybersecurity Expertise
Cyber Threat Intelligence, Risk Assessment, Cybersecurity Awareness
Technology Type
Computer Network, Database, Operating System, Web Application, Mobile Device
Cybersecurity Regulation
ISO, NIST Cybersecurity Framework
What's included
Service Tiers Starter
$200
Standard
$250
Advanced
$350
Delivery Time 2 days 3 days 5 days
Small Company Size
Medium Company Size
-
Large Company Size
-
-
-

Frequently asked questions

4.4
6 reviews
83% Complete
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
17% Complete
Rating breakdown
Availability
4.3
Deadlines
4.3
Skills
4.3
Quality
4.3
Cooperation
4.3
Communication
4.5

RK

Rupesh K.
4.70
Mar 23, 2024
Security Protocols Analysis and Reporting using Wireshark

MP

Marco P.
5.00
Sep 13, 2023
Security onion - distributed deployment - He is a true cyber security analyst.
I recommend him, as a person and as an employee.

AI

Abdulrahman I.
5.00
Jan 29, 2023
Cyber security consultant Dear Adam,

I just wanted to reach out and express my heartfelt gratitude for the exceptional work you have done for me on my recent project. Your professionalism, attention to detail, and ability to deliver high-quality work in a timely manner were truly impressive.

You went above and beyond my expectations, and I am extremely satisfied with the final result. Your expertise and creative approach to the project helped bring my vision to life and exceeded my expectations.

I appreciated your open communication throughout the project, which made the process seamless and enjoyable. Your willingness to listen to my needs and make any necessary changes made the experience even more enjoyable.

I highly recommend Adam to anyone looking for a talented and reliable freelancer. I will definitely be working with you again in the future, and I am already looking forward to our next project together.

Once again, thank you for your excellent work. You are an exceptional professional, and I am lucky to have had the opportunity to work with you.

Best regards,
Ismail

NH

Nauman H.
1.45
Jan 29, 2023
Malware forensics Poor work. 31/100
Do not release payment until you get revisions and result.

TM

Tawanda M.
5.00
Jun 17, 2022
I am looking for a Linux and Python tutor. Adam was magnificent. He really knows his stuff.
I hardly knew any Python when we started working. Four weeks later, and I am about to finish my web scraping and web development project in Python.
Can absolutely recommend.
Adam C.

About Adam

Adam C.
SOC| SIEM| Malware Analysis | Python Programming| Bash| Linux
100% Job Success
4.4  (6 reviews)
Nairobi, Kenya - 7:13 am local time
A cyber security enthusiast with 8 years' experience in the technology and security industry and highly skilled in python programming, technical writing and penetration testing.
- I'm experienced in web application testing and security assesments
- Fully versed in Python programming, Bash scripting and penetration testing

Steps for completing your project

After purchasing the project, send requirements so Adam can start the project.

Delivery time starts when Adam receives requirements from you.

Adam works on your project following the steps below.

Revisions may occur after the delivery date.

Review the project

Step-by-step review of the project before submission

Review the work, release payment, and leave feedback to Adam.