
Đã đóng
Đã đăng vào
Thanh toán khi bàn giao
I have a single malware command that was executed on my Windows machine before I wiped the system. I now need that same command run inside a fully isolated virtual machine so every stage can be captured, unpacked, and reviewed without risking any real hardware. I am primarily worried about credentials and logins, browser sessions and cookies, files and documents—really anything the attacker might have reached for. To answer that, I’m asking for a full hybrid analysis that blends static inspection of the PowerShell and Python payloads with live dynamic monitoring. Please instrument the VM, let the malware phone home if it must, watch the network traffic, intercept any staged downloads, and document each indicator of compromise. Deliverables: • A concise written report, in plain language, that explains what information the malware tried (or was able) to steal and how it does so. • A timeline of execution showing every file, registry change, or network call observed. • Any recovered payloads, decoded scripts, and IOC lists packaged in a password-protected archive. Speed matters—I’d like an initial overview the same day you finish the run, with the full report delivered ASAP. Let me know the tools you prefer (e.g., IDA, Ghidra, Procmon, Wireshark, Volatility) and your estimated turnaround once you receive the sample so we can get started right away.
Mã dự án: 40302559
59 đề xuất
Dự án từ xa
Hoạt động 24 ngày trước
Thiết lập ngân sách và thời gian
Nhận thanh toán cho công việc
Phác thảo đề xuất của bạn
Miễn phí đăng ký và cháo giá cho công việc
59 freelancer chào giá trung bình $158 USD cho công việc này

Hello, I understand your goal to run the malware in a fully isolated VM and capture every stage, indicators of compromise, credentials, and browser data without risking real assets. This is my speciality: delivering controlled, end-to-end malware analysis in safe environments so you get clear, actionable findings without risk. I'm Iosif Peterfi, 15+ years guiding security and infrastructure projects from Europe, focused on practical business outcomes and steady, transparent delivery. Your brief calls for a concise written report, a detailed execution timeline, and packaged payloads-delivered fast and with zero impact on your live environment. You'll get an integrated package: a fully isolated VM with instrumentation, a hybrid analysis of static payloads and live monitoring, network traffic capture, interception of staged downloads, and a plain-English report of every indicator of compromise. A clear timeline showing every file, registry change, or network call observed, plus recovered payloads and decoded artifacts in a password-protected archive. This approach minimizes risk, accelerates decision-making, and provides bite-sized, business-focused insights for remediation. Similar project story: Last quarter I helped a financial services client run a Windows malware sample in a sandbox; we mapped credential theft paths and captured complete IOCs, delivering a concise report and a concrete remediation plan.
$600 USD trong 3 ngày
6,9
6,9

I'll conduct full hybrid analysis—static + dynamic—inside an isolated VM with network interception enabled. I'll use Procmon, Wireshark, Volatility, and Ghidra to trace every file drop, registry change, credential grab, and C2 callback from your PowerShell/Python payloads, delivering decoded scripts, IOC lists, and a password-protected archive. Initial overview: same day. Full report: 24–48hrs post-sample.
$140 USD trong 7 ngày
6,3
6,3

Hi there Thanks for posting this exciting project. I checked your project carefully, I think I can complete your project within your needed timeline. I am super professional in Python, Linux, Computer Security, Software Architecture, Report Writing, Network Administration, Penetration Testing, Virtualization, Reverse Engineering, Network Monitoring Please ping , I am always online here Thanks Efanntyo -.
$30 USD trong 5 ngày
6,0
6,0

Hello, I can safely execute and analyze your malware command inside a fully isolated virtual machine to capture every stage without risking real hardware. I have experience with both static and dynamic malware analysis, including PowerShell and Python payloads. Preferred tools: Procmon, Wireshark, Volatility, IDA/Ghidra I can start immediately once the sample and environment details are provided. Best regards, Muhammad Jibran
$255 USD trong 1 ngày
5,6
5,6

Hi, As per my understanding: You have a malware command previously executed on your Windows system and now want it safely analyzed inside a fully isolated VM. The goal is to perform both static and dynamic analysis to understand the behavior of the PowerShell/Python payload, monitor execution stages, capture network communication, identify any staged downloads, and determine whether credentials, browser sessions, files, or other sensitive data could have been targeted. The final output should clearly explain the attack behavior, provide a timeline of activity, and include recovered payloads and IOC indicators. Implementation approach: I would first recreate a controlled sandbox using an isolated Windows VM with no host interaction, instrumented with monitoring tools such as Procmon, Wireshark, TCPView, and Sysmon. Static analysis will begin by reviewing the PowerShell and Python scripts using tools like Ghidra or IDA to understand obfuscation, payload stages, and potential C2 behavior. Then dynamic analysis will be performed by executing the command inside the sandbox while capturing system calls, registry changes, file activity, memory artifacts, and network traffic. Any downloaded payloads will be intercepted and unpacked for further inspection. Indicators of compromise, decoded scripts, and recovered artifacts will be documented and packaged securely. A few quick questions: Do you still have the original command and any related files or logs?
$98 USD trong 5 ngày
5,3
5,3

Hello, I can assist with a controlled malware detonation and hybrid analysis to safely execute the command inside a fully isolated virtual machine and capture its behavior without risking real hardware. My approach combines static inspection and dynamic monitoring to determine whether the payload targets credentials, browser sessions, cookies, files, or other sensitive data. Methodology: • Execute the command in an instrumented isolated VM / sandbox environment • Static analysis of PowerShell and Python payloads to identify embedded scripts, obfuscation, or secondary stages • Dynamic monitoring of process activity, filesystem changes, registry modifications, and memory artifacts** • Network traffic capture to observe command-and-control activity and staged downloads • Extraction of additional payloads and creation of Indicators of Compromise (IOC) Tools may include Procmon, Wireshark, Volatility, Ghidra/IDA, and controlled sandbox instrumentation to ensure full behavioral visibility. Deliverables: 1. Clear report explaining what the malware attempted to access or steal 2. Timeline of execution covering files, registry changes, and network calls 3. Recovered payloads, decoded scripts, and IOC list in a secure archive I can provide an initial overview shortly, followed by the full report after full analysis. Best regards, Kajal Majhi Cybersecurity & Digital Forensics Consultant
$200 USD trong 7 ngày
4,9
4,9

Hello, With over 7 years of experience in Python and report writing, I have carefully reviewed your project requirements. I propose to conduct a comprehensive isolated malware behavior analysis using a blend of static inspection and live dynamic monitoring. I will set up a fully isolated virtual machine to execute the malware command, capturing and analyzing every stage of its behavior. Through static inspection of PowerShell and Python payloads, as well as live monitoring of network traffic and downloads, I will document each indicator of compromise. The deliverables will include a detailed report outlining the information the malware attempted to steal and its methods, a timeline of execution, and any recovered payloads and IOC lists. I will ensure prompt delivery of an initial overview upon completion, with the full report to follow quickly. I am ready to discuss the project further in chat to address any questions or concerns you may have. You can visit my profile at https://www.freelancer.com/u/HiraMahmood4072 Thank you.
$100 USD trong 2 ngày
4,9
4,9

( I may have missed my previous project, but I’d appreciate the chance this time. I will do my best. Thank you. ) --Fixed $ 80 USD, 2 days-- Hi, I can safely run and analyze the malware command inside a fully isolated virtual machine, so there’s no risk to your system or data. I’ll review the PowerShell and Python parts and monitor what happens during execution, including processes, file changes, registry activity, and any network connections. This helps identify hidden behavior like downloads, phone-home attempts, or credential access. I’ll provide a clear report with the execution timeline, recovered payloads, and key indicators, and can share an initial overview the same day once the analysis is done.
$80 USD trong 2 ngày
4,1
4,1

Hello, Manny! I specialize in reverse engineering, malware analysis and data protection. Your project sounds like an interesting challenge and very good fit. We can discuss further over chat. Thanks for reading. Just an FYI, here are a few links from my previous projects: www.freelancer.com/projects/C-programming/Diassembly-exe-file/ www.freelancer.com/projects/delphi/Seeking-bit-Delphi-expert-hacker/ www.freelancer.com/projects/c-sharp-programming/Convert-Windows-Dll-function-code/ www.freelancer.com/projects/cplusplus-programming/Need-someone-expert-EXE-file/ www.freelancer.com/projects/C-Programming/remove-security-from-exe/ www.freelancer.com/projects/C-Programming-Metatrader/decompile-protected/ www.freelancer.com/projects/C-Programming-Delphi/Need-reverse-engineer/ www.freelancer.com/projects/C-Programming-Anything-Goes/bypassing-lost-password/ www.freelancer.com/projects/Java-Visual-Basic/Revsere-exe/ www.freelancer.com/projects/Delphi-Anything-Goes/EXE-Change/ www.freelancer.com/projects/Software-Architecture/Reverse-engineering-7762549/
$600 USD trong 7 ngày
4,3
4,3

As a seasoned software architect, I understand the criticality of malware analysis and the derived implications for your data security. My team at Prajapati Technologies specializes in exactly this kind of work. We can seamlessly transpose your unique malware command into a fully isolated virtual machine, completely eliminating any residual risks and ensuring a comprehensive analysis that mitigates all possible future threats. Speed is one of our key strengths at Prajapati Technologies; it's a virtue we developed through our extensive 10 years' experience. While keeping you informed every step of the way, I guarantee to provide an initial overview immediately upon completing the run and deliver a full report asap after that. Furthermore, we'll carefully document each indicator of compromise along with a concise report explaining what data the malware sought to access and how it attempted to do so
$160 USD trong 7 ngày
4,2
4,2

Hello, I hope you're doing well. I understand that you're looking for a thorough analysis of a malware command executed on your Windows machine, and it's crucial to isolate this in a safe environment to observe its behavior without risking your actual system. Your concerns about credentials, browser sessions, and overall data security are completely valid and must be treated with the highest urgency. My approach will involve setting up a fully isolated virtual machine to run the malware command while employing both static and dynamic analysis techniques. I will monitor the network traffic, document all observed indicators of compromise, and provide detailed insights into what the malware attempts to access. You'll receive a clear report outlining the findings, including a timeline of execution and any recovered payloads in a secure format. I can move quickly on this and deliver an initial overview on the same day of execution. Let's connect to ensure we're aligned on the tools and methodology. I'd like to have a chat with you at least so I can demonstrate my abilities and prove that I'm the best fit for this project. Warm regards, Natan.
$140 USD trong 7 ngày
3,4
3,4

I'm a UK-based security researcher and I've spent plenty of time in the "malware trenches." Running a single suspicious command in a detonated lab is the best way to see exactly what the attacker was after. I can have your initial "What happened?" overview ready within 24 hours of execution. The Game Plan Isolation: I’ll use a hardened FLARE VM (Windows) inside a host-only network. I use INetSim to fake common services, but I can switch to a "dirty" line if we need to see the real C2 (Command & Control) response. Monitoring: I’ll run the "Holy Trinity": Wireshark (network), Procmon (system calls), and TCPView. Deep Dive: I’ll use Ghidra and x64dbg for the Python/PowerShell unpacking. Most modern stealers try to grab Chrome SQLite databases (cookies/passwords) and Discord tokens—I’ll be watching for those specific file-read events. Forensics: I’ll take a memory dump and use Volatility 3 to find any injected code hiding in legitimate processes like explorer.exe. Deliverables The "Plain English" Summary: Exactly what they took (or tried to). The IOC List: Every IP, domain, and file hash I find. The Evidence: A password-protected .zip with all the decoded stage-2 payloads. Quick Questions Do you want me to allow the malware to reach the real internet, or should I keep it strictly simulated? (Simulated is safer, but real internet shows the actual exfiltration). Was the command a direct PowerShell "one-liner" or a script?
$30 USD trong 1 ngày
3,4
3,4

Hope you are doing well! Lets start! Extensive experience performing malware analysis in fully isolated virtual environments, combining static and dynamic inspection for PowerShell, Python, and mixed payloads. Setup includes instrumented VMs with network monitoring, sandboxing, and logging to capture all file, registry, and network activity while preventing any risk to host systems. Previous engagements included tracing staged downloads, intercepting C2 communications, decoding obfuscated scripts, and reconstructing execution flows for reporting. Tools routinely used include Procmon, Wireshark, Volatility, IDA, and Ghidra to extract indicators of compromise, track system modifications, and perform payload reverse engineering. Deliverables include a plain-language report of attempted data access, a detailed execution timeline, recovered payloads, decoded scripts, and IOC lists in a password-protected archive. Initial overview can be provided the same day the analysis is complete, with full documentation delivered promptly thereafter. I know what do I build for you, can complete it to your full satisfaction within your timeline. I am ready for you and waiting here. Thank you.
$140 USD trong 7 ngày
3,3
3,3

I see you need a fully isolated virtual machine setup to safely execute and analyze a single malware command from your Windows machine, focusing on capturing every stage without risking actual hardware. You want both static and dynamic analysis on PowerShell and Python payloads, with detailed monitoring of credentials, browser data, and network activity. Your project requires instrumenting the VM to observe network traffic, staged downloads, and system changes, then delivering a clear report with a timeline of execution, recovered payloads, and indicators of compromise. I understand the urgency for an initial overview on the same day as execution and a comprehensive report soon after. I’ve conducted malware behavior analysis using VMs with tools like Procmon, Wireshark, Ghidra, and Volatility to track file changes, network calls, and decode scripts, providing detailed timelines and plain-language reports. This experience directly aligns with your need to blend static and dynamic analysis while securely isolating the environment. I can complete the initial overview within the same day of running the sample and deliver the full report within 48 hours. Let’s discuss your preferred tools and get started immediately once you share the command.
$33 USD trong 7 ngày
3,1
3,1

Hello, I have previously conducted malware sandbox analysis projects where suspicious PowerShell loaders and Python droppers were executed inside fully isolated virtual environments to investigate credential theft and command and control behavior. In one incident response case, a client suspected an info stealer infection; I recreated the execution chain inside an instrumented Windows VM, captured network traffic, unpacked staged payloads, and identified browser credential harvesting attempts and registry persistence mechanisms. Controlled malware analysis workflow. I will recreate the command execution inside a hardened, isolated VM with monitoring tools such as Procmon, Wireshark, and system logging enabled. During execution I will capture filesystem changes, registry activity, network callbacks, and any secondary payload downloads. I will then perform static inspection of the PowerShell/Python code to decode obfuscation and identify data exfiltration logic, producing a timeline of activity, recovered payloads, and a clear report explaining what data the malware attempted to access. Best regards,
$180 USD trong 7 ngày
3,1
3,1

Hello, I appreciate the opportunity to assist you with your malware analysis requirements. I have extensive experience in cybersecurity and malware analysis, including static and dynamic analysis of PowerShell and Python payloads. My goal is to ensure a thorough investigation of the malware command to identify any potential threats it poses to your systems and data. To successfully complete the project, I propose the following approach: - Set up a fully isolated virtual machine to execute the malware command while ensuring all activities are monitored. - Conduct a hybrid analysis that combines static inspection of the payloads with live dynamic monitoring, utilizing tools like IDA, Ghidra, Procmon, and Wireshark. - Capture and document all indicators of compromise, including network traffic, file changes, and registry modifications. - Provide a detailed report in plain language, including a timeline of execution and a password-protected archive with recovered payloads and IOC lists. I understand the urgency of this project and am committed to delivering an initial overview the same day the analysis is completed, with a comprehensive report following as quickly as possible. I can discuss tools and specific details further to ensure a tailored solution for your needs. I am eager to get started and can accommodate your timeline. Please let me know if you’d like to discuss this further!
$140 USD trong 7 ngày
2,7
2,7

As a highly skilled and experienced freelancer with over 8 years of software development expertise, I bring unique value to your project. I have a proven track record of automating complex tasks, streamlining workflows, and integrating custom APIs - all of which make me well-equipped to address your specific requirements for this project. Not only do I have deep proficiency in using key tools such as the Google APIs, Airtable, Twilio, Ultravox, Vapi, Perplexity and more that could be relevant in your project execution, but my background as a Linux expert familiar with Python equips me well to handle the isolation and analysis you need. Additionally, my experience with software architecture allows me to devise efficient solutions fit for purpose. Let's get started now and ensure a rapid yet accurate overview along with complete insights without any compromise on quality.
$166,67 USD trong 7 ngày
2,8
2,8

Hi, that’s great to hear! Your project closely aligns with one I recently completed. In that project, I built a fully isolated malware analysis environment using hardened virtual machines, deep static inspection workflows, and dynamic monitoring pipelines with tools like Ghidra, Procmon, and Wireshark, integrating automated unpacking and staged payload capture. Given your need to analyze the PowerShell and Python components, document every IOC, and generate a clear non-technical report, I can replicate that proven process for your sample while ensuring complete containment and visibility. I’d be glad to connect and share my experience in more detail over chat. Thank you. Best regards, Lazar
$100 USD trong 1 ngày
2,2
2,2

Hello, I specialize in malware behavior analysis and defensive security research. I can set up an isolated sandbox environment and safely analyze the behavior of the sample(s) you provide. I’ll document network activity, file/system changes, persistence methods, and indicators of compromise, and deliver a clear report with recommendations for detection and mitigation. My focus is on safe analysis and actionable insights to help you understand threats without risk to production systems. Regards, Bharti
$140 USD trong 7 ngày
2,2
2,2

Hi there, I understand the critical nature of your request for a full hybrid analysis of the malware command executed on your Windows machine. My expertise in cybersecurity and malware analysis makes me confident in delivering the results you seek. Having worked on similar projects in the past, I propose a meticulous approach that combines static inspection of the PowerShell and Python payloads with live dynamic monitoring using tools like IDA, Ghidra, Procmon, Wireshark, and Volatility. This will allow for comprehensive tracking of the malware's behavior and any indicators of compromise. I will ensure that the isolated virtual machine is well-instrumented to capture all stages of the malware's activity, from network traffic monitoring to intercepting staged downloads. The deliverables will include a concise report, a detailed execution timeline, and any recovered payloads packaged securely for your review. With a commitment to speed, I aim to provide you with an initial overview on the same day of completion and deliver the full report promptly. Let's discuss your preferred tools and the sample submission process to kick off the analysis right away. Looking forward to working together on this project. Ihsan Faridi
$140 USD trong 7 ngày
2,0
2,0

HIALEAH, United States
Phương thức thanh toán đã xác thực
Thành viên từ thg 1 21, 2024
$10-30 USD
$10-30 USD
$750-1500 USD
$15-25 USD/ giờ
₹750-1250 INR/ giờ
$5000-10000 USD
$30-250 USD
$250-750 USD
$30-250 USD
₹600-1500 INR
$30-250 USD
€65-70 EUR/ giờ
$10-30 USD
$15-25 USD/ giờ
₹37500-75000 INR
$10-30 USD
$30-250 AUD
$30-250 USD
₹100-400 INR/ giờ
€250-750 EUR
$10-75 USD
₹12500-37500 INR
₹12500-37500 INR
$15-25 CAD/ giờ