
Concluído
Publicado
Pago na entrega
Inside an isolated VMware lab I need a thorough, repeatable analysis of a live ransomware sample. The sole objective is to reveal how the malware first lands, escalates, and persists so I can tighten my organisation’s preventive controls and monitoring rules. While reverse-engineering you are free to use IDA, Ghidra, x64dbg, Wireshark, ProcMon, or any other tooling you prefer, as long as the findings are clearly documented and can be reproduced in a fresh VM snapshot. Deliverables (all required): • Technical report that narrates the complete infection chain—initial dropper, files created, registry or scheduled-task changes, command-and-control traffic, and encryption trigger. • IOC spreadsheet with file hashes, mutexes, URLs, IPs, and any relevant YARA signatures. • Mitigation section mapping the observed techniques to concrete hardening steps (e.g., Group Policy tweaks, firewall rules, EDR detections). • VM rollback instructions so I can safely re-run the sample if needed. Acceptance criteria: The report must be detailed enough for a security team to reproduce the behaviour in VMware and immediately translate the insights into endpoint or network prevention rules. If you have prior ransomware reverse-engineering experience and can hand over the first draft within a week, let’s get started.
ID do Projeto: 40137278
19 propostas
Projeto remoto
Ativo há 2 meses
Defina seu orçamento e seu prazo
Seja pago pelo seu trabalho
Descreva sua proposta
É grátis para se inscrever e fazer ofertas em trabalhos
19 freelancers estão ofertando em média $139 SGD for esse trabalho

HI, i have diverse array of skills and extensive experience in network administration, network security, and technical writing, I am uniquely equipped to assist you with your complex and pivotal task of ransomware analysis. I have a strong command of various tools including IDA, Ghidra, x64dbg, Wireshark, and ProcMon, all of which are essential for complete and reliable malware assessment. As a BSc degree holder in computer science with a diploma in project management and an ITIL Framework certification, I understand the importance of robust security measures for digital systems. My commitment to timeliness and reliability is matched only by my dedication to producing high-quality work rooted in thorough research. You can trust me to provide you not only with a technically detailed report but also actionable insights to harden your organization's security infrastructure. With my skills in digital forensic- notably identifying malware behavior, analyzing intrusion evidence, and designing incident response strategies- I assure a preemptive mitigation section that maps observed ransomware tactics to practical defense steps. Furthermore, my prior experience executing efficient project management practices guarantees not just detailed deliverables but also clear_vm snapshot rollback instructions as explicit as "hacker-proof" itself. Give me the opportunity to collaborate with your security team!
$50 SGD em 3 dias
7,6
7,6

As a seasoned Network, Cybersecurity, and System Engineer with over a decade of experience in the IT industry, I believe I'm the dream candidate for your VMware Ransomware Infection Analysis project. Not only am I comfortable with the specific tools you suggested - IDA, Ghidra, x64dbg, Wireshark, ProcMon- but I've also been known to be a quick-learner in new tooling. Over the years, I have designed and implemented network infrastructures for startups as well as large enterprises using powerful vendor solutions such as VMware—giving me an intimate understanding into how ransomware infections happen and how to prevent them. Another aspect that set me apart is my dedication to best practices. Your project demands thorough documentation paired with concrete hardening steps - my style precisely. I'll provide you with both a detailed technical report revealing the entire infection chain and an IOC spreadsheet, followed by a mitigation section mapping these observed techniques to specific hardening steps. With me in your corner, not only will you receive obsessive attention to detail but also prompt delivery - just ask my previous clients who can vouch for this! I am confident that my expertise in the areas critical to your project success will prove invaluable. Let's get started and turn this potential vulnerability into nothing more than a footnote in your security strategy!
$200 SGD em 3 dias
7,2
7,2

My name is Rabia Faisal, I am working in the writing industry since 2011. During this time, I have served countless clients with a full amount of satisfaction by providing them with TOP Quality Solutions. I have command of all references APA, Harvard, IEEE, MLA & Chicago, etc. I will provide plagiarism-free work with 100 percent accurate grammar within your given deadline. Please message me to get Top Class Services. I am waiting; https://www.freelancer.com/u/TopWritingGuru
$30 SGD em 1 dia
6,6
6,6

My name is "Usama Safdar" and I am a Ph.D degree holder which means I am highly-capable to tackle this project "Content Editor " with 100 percent accuracy. I am a professional writer with over 6 years of experience in writing; Essays, Research Summaries, Thesis, Dissertation, Lab Reports and Case Studies. I always provide High-Quality Solutions within the shortest possible time with all instructions followed against very reasonable prices. I can manage works even with shortest deadlines like; "2500 words work in just 6 Hours" with very reasonable time. As a pro academic writer I am also familiar with all the referencing styles; such as APA, Harvard, OSCOLA, IEE, MLA etc. I always provide plagiarism-free solutions and as a prove I also provide "FREE Turnitin reports". For Samples, please visit my profile https://www.freelancer.com/u/SolutionMart Please message me to start the discussion. Thank You
$30 SGD em 1 dia
5,7
5,7

Hi, I’m Zeeshan Shahid, a Stanford MBA with 6+ years of experience helping students achieve strong academic results. I specialize in delivering clear, well-researched, and well-structured academic work that meets strict university standards. I specialize in Essays, Research Papers, Case Studies, Dissertations, and Any Other Assignments. Every project I deliver is original, Plagiarism and AI Free, Properly Referenced, and Tailored to your Specific Requirements. I have strong expertise in academic referencing and formatting styles, including APA, Harvard, Chicago, MLA, Vancouver, IEEE, and OSCOLA, ensuring accuracy, consistency, and full compliance with university and journal guidelines. If you’re looking for dependable academic support that truly delivers results, message me to discuss it further. Thank You!
$30 SGD em 1 dia
5,5
5,5

Hello there, I can perform a controlled, fully reproducible ransomware analysis inside an isolated VMware lab and document the complete infection lifecycle—from initial execution and privilege escalation through persistence, C2 activity, and encryption. My approach focuses on producing clear, actionable intelligence your security team can immediately operationalize. You’ll receive a concise technical report, a clean IOC spreadsheet (hashes, mutexes, network indicators, YARA), practical mitigation guidance mapped to observed techniques, and precise VM rollback steps to safely re-run the sample. All findings will be reproducible from a fresh snapshot. I have hands-on experience with ransomware reverse-engineering using IDA, Ghidra, x64dbg, ProcMon, and network analysis tools, Please come to the chat box so we can easily discuss in details, Best regards, Muhammad Jibran
$210 SGD em 1 dia
4,6
4,6

Hello, I’m a cybersecurity and digital forensics professional with hands-on experience in malware analysis, ransomware reverse engineering, and endpoint defense validation. Your requirement for a controlled, repeatable ransomware analysis inside an isolated VMware environment aligns perfectly with my workflow and prior engagements. The Goal: How the ransomware initially lands How it escalates privileges How it establishes persistence How and when encryption is triggered How defenders can detect, block, and monitor each stage. All analysis will be performed in a fully isolated VMware lab, with reproducibility as a primary requirement.I will conduct a dynamic + static hybrid analysis, documenting every observable stage so your security team can replay it from a clean snapshot. Toolset: Static: Ghidra Dynamic: x64dbg, ProcMon, Process Explorer Network: Wireshark Behavioral: Autoruns, Regshot, Sysmon Supporting: Custom scripts for IOC extraction & YARA drafting. Deliverables Comprehensive Technical Report Initial infection vector & dropper behavior File system artifacts Registry keys, services, scheduled tasks, persistence logic Privilege escalation techniques (if present) Command-and-control behavior (protocols, domains, timing) Regards Kajal Majhi
$250 SGD em 7 dias
4,3
4,3

With a strong background in technical writing and reverse engineering, I'm confident that I can provide the in-depth analysis you're looking for. My proficiency with tools like IDA, Ghidra, and Wireshark, coupled with my understanding of Cisco and network security, allows me to efficiently unravel malware behavior, identify IoCs, and devise concrete hardening steps. I've honed my skills by tackling challenges across various domains such as fintech and healthcare where data integrity and security are critical. Crucially, I understand the value of delivering detailed reports that are immediately actionable. Drawing on my experience in cryptography and analytics, I'll provide a clear narrative of the infection chain - initialization-dropper identification, files creation, changes in registry or scheduled-tasks, C2 traffic detection & encryption trigger. The report will be supplemented with an IOC spreadsheet containing the relevant YARA signatures to help streamline your organization's preventive controls more effectively.
$150 SGD em 3 dias
3,5
3,5

Hi there. I specialize in projects like VMware Ransomware Infection Analysis, and my background in Linux allows me to execute efficiently from day one. Your project demands solid knowledge of Linux, Technical Writing, Cisco, VMware, Network Administration, Documentation, Network Security, Reverse Engineering, with a focus on accuracy, scalability, and clear execution. I bring strong expertise in Linux, backed by successful project delivery for clients in Singapore and internationally. My approach ensures VMware Ransomware Infection Analysis is completed correctly the first time, using proven methods in Linux. If you want reliable execution without wasted time, let’s move forward and start immediately. Best regards, Yevhenii
$140 SGD em 1 dia
0,0
0,0

Hello Alvin, I hope you are well. I have a few questions to better understand your VMware Ransomware Infection Analysis project. Have you encountered any specific ransomware strains before, and are you looking for insights into a particular type of ransomware? In my experience, focusing on the ransomware's behavior and attack vectors can provide valuable insights for enhancing preventive controls and monitoring rules. I am confident in my ability to conduct a thorough and repeatable analysis of the live ransomware sample in your isolated VMware lab. By utilizing tools such as IDA, Ghidra, x64dbg, Wireshark, and ProcMon, I will document detailed findings that can be easily reproduced in a fresh VM snapshot. Deliverables: - Detailed technical report outlining the complete infection chain - IOC spreadsheet with relevant indicators of compromise - Mitigation section mapping observed techniques to hardening steps - VM rollback instructions for safe re-running of the sample I'll share my portfolio with you in the DM. Kindly ping me there. My experience in ransomware reverse-engineering ensures quality and actionable insights for your organization. I'd be happy to discuss your project further and answer any questions. Best regards, Malaika
$140 SGD em 7 dias
0,0
0,0

Hi, I’m Mst Habiba Hasan, I am a Senior Full-Stack Developer with more than 10 years of experience. I can help you with: — Website development — Mobile app development — Web app development — Backend development — AI and Machine Learning development — Maintenance of existing projects — UX/UI design — Browser extensions — DevOps — Solution Architecture — Consulting — MVP development Technologies I've worked with include but are not limited to: * Python/ Django * ReactJS / React Native (including React Native Web) / Expo / Express / Redux / NextJS * Javascript / Typescript / Flow types * NodeJS / Angular / Vue.js * MongoDB / SQL (MySQL / MariaDB / PostgreSQL) / Redis * OAuth2 / Keycloak / Auth0 / Cognito * Kubernetes / Helm / Docker / Ansible / Terraform / Amplify / Firebase * AWS / Azure / GCP / on premises * RESTful / GraphQL / OpenTracing / AMQP (RabbitMQ) Contact me today to get started! I’m excited to collaborate and bring your vision to life. Best regards, Mst Habiba Hasan
$255 SGD em 2 dias
0,0
0,0

Hey there, Even though I belong from data analytics background, my brother is a senior malware analyst who has more than 5 years of experience and has working experience with company like microsoft but is not available on freelancer, if you are interested, we can work together along with him as he is interested in such kind of projects and will deliver the report to you. Regards, Aniket Singh
$100 SGD em 1 dia
0,0
0,0

Hello! I am a System Administrator specialized in Linux environments and Virtualization (VMware). I am interested in this analysis project. I can perform a complete Behavioral Analysis of the ransomware sample within a strictly isolated environment. Since I work from a Linux host (Arch-based), I can ensure a secure containment while monitoring the malware's activity inside the Windows VM. My approach for your deliverables: Infection Chain: I will document the execution flow using tools like Process Monitor and logs to track file creation and registry changes. Network Analysis: I will use Wireshark to capture and identify Command-and-Control (C2) traffic, extracting IPs/URLs for your IOC list. Persistence: I will identify scheduled tasks or startup keys used by the malware. Mitigation: Based on the findings, I will suggest specific firewall rules and Group Policy restrictions. I can deliver the detailed Technical Report and the IOC Spreadsheet within 3 days. Ready to set up the lab and start analyzing. Best regards, Joel Franco C.
$140 SGD em 3 dias
0,0
0,0

As a seasoned Python developer with substantial experience building secure systems, I am confident in my ability to meticulously perform reverse-engineering and analysis on your live VMware ransomware sample under your given constraints. Over my 5+ years of experience, I have developed robust scripts and data pipelines while strictly adhering to maintainability and end-to-end quality. In past projects, I have built REST APIs supporting thousands of users daily and automated ML model training workflows, which involved working intimately with Linux environments. This proficiency in network administration, making productive use of tools like Wireshark and ProcMon, will be invaluable for this specific project. Moreover, my self-driven problem-solving approach aligns perfectly with this task's demands. My track record of migrating legacy systems to scalable ones and developing real-time data-streaming pipelines will reassure you of my capabilities to deliver effective results even under tight deadlines. I am fully equipped and ready to hit the ground running on this ransomware analysis project! Say goodbye to guesswork and hello to concrete preventive measures!
$140 SGD em 2 dias
0,0
0,0

Fair point — here’s a cleaner, more human‑sounding paragraph with no dashy rhythm and less “AI bid” energy: I can analyze the ransomware sample end to end inside an isolated VMware lab to fully document how it initially executes, gains privileges, establishes persistence, communicates externally, and ultimately triggers encryption. The work will combine static and dynamic reverse engineering using tools such as IDA or Ghidra, x64dbg, ProcMon, Sysmon, Autoruns, and Wireshark, with behavior verified through repeated runs from clean VM snapshots to ensure everything can be reproduced reliably. You will receive a detailed technical report that walks through the complete infection chain in clear steps, an IOC spreadsheet containing hashes, artifacts, network indicators, and YARA signatures, and a mitigation section that maps the observed techniques directly to practical hardening actions and detection rules. I will also provide clear rollback and re‑execution instructions so the sample can be safely tested again if needed. I have prior experience reverse‑engineering live ransomware and can deliver the first draft within a week, focused on producing findings that a security team can immediately turn into preventive controls.
$140 SGD em 7 dias
0,0
0,0

singapore, Singapore
Método de pagamento verificado
Membro desde jul. 8, 2016
$12-30 SGD
$12-30 SGD
$12-30 SGD
$12-30 SGD
$12-30 SGD
£18-36 GBP / hora
$30-250 USD
£750-1500 GBP
$8-15 AUD / hora
$15-25 USD / hora
₹1500-12500 INR
$10-30 USD
$10-30 USD
$10-20 NZD / hora
mín. £36 GBP / hora
$25-50 USD / hora
₹1500-12500 INR
₹1500-12500 INR
₹250000-500000 INR
$30-250 USD
$25-50 USD / hora
$30-250 USD
$15-25 USD / hora
$250-750 USD
$8-15 USD / hora