
Đang mở
Đã đăng vào
•
Kết thúc sau 6 ngày
Thanh toán khi bàn giao
I'm seeking a skilled professional to analyze PDF malware. The goal is to gather evidence for legal actions. Key tasks include: - Investigating self-launching Charon: We need to understand its behavior and gather evidence of its operation. - Evidence gathering: Focus on file modifications, malware origin, and network activity logs. - Detailed reporting: Provide comprehensive reports on findings. Ideal skills and experience: - Expertise in malware analysis - Experience with PDFs and associated threats - Strong background in cybersecurity - Familiarity with Charon and similar malware - Excellent reporting skills
Mã dự án: 40275647
11 đề xuất
Mở nhận chào giá
Dự án từ xa
Hoạt động 3 phút trước
Thiết lập ngân sách và thời gian
Nhận thanh toán cho công việc
Phác thảo đề xuất của bạn
Miễn phí đăng ký và cháo giá cho công việc
11 freelancer chào giá trung bình $35 CAD cho công việc này

Hi,\n\nAnalyzing PDF malware like Charon requires precision, and I understand the urgency of gathering evidence for legal proceedings. Having spent the last 6 years specializing in malware analysis, I have the expertise to delve into its behavior, focusing on file modifications, malware origins, and network activity.\n\nI will utilize advanced forensic tools to dissect the self-launching mechanism of Charon, ensuring we capture every critical detail. My robust reporting skills will allow for comprehensive documentation of findings, providing you with clear insights essential for legal actions. \n\nThanks,\nZeeshan
$15 CAD trong 1 ngày
4,9
4,9

Hello , I've just reviewed your project description regarding the PDF Malware Analysis Specialist and I'm confident in my ability to meet your expectations. With over 7 years of experience as a Senior Graphic Designer, I possess a strong skill set in Risk Management, Computer Security, Network Monitoring, Penetration Testing, Network Security, PDF, Data Analysis and Digital Forensics I kindly request you to take a moment from your busy schedule to explore our portfolio, where you can see the quality of my work and read feedback from previous clients: [Portfolio Links] https://www.freelancer.com/u/afshan2176 Could you please specify the final file formats you'll require? Feel free to award me the project so that we can discuss it further. Looking forward to connecting with you. Best regards, Afshan Z.
$10 CAD trong 1 ngày
4,5
4,5

Hi There, I’ve reviewed your project details "I'm seeking a skilled professional to analyze PDF malware......" and understand your goal for “PDF Malware Analysis Specialist”. I’m Hamza, a professional artist/designer with 10+ years of experience. I’ve handled similar work using Risk Management, Network Monitoring, Penetration Testing, PDF, Data Analysis, Digital Forensics, Computer Security and Network Security — portfolio: https://www.freelancer.com/u/LionConcepts Process: requirements → draft → revisions → final delivery. Timeline fits your needs. Best, Lion Concepts
$80 CAD trong 3 ngày
2,7
2,7

Hi There, I’ve gone through your project description "I'm seeking a skilled professional to analyze PDF malware......" and understand your expectations. I’m a professional artist/designer with 10+ years of experience in PDF, Risk Management, Data Analysis, Digital Forensics, Penetration Testing, Computer Security, Network Monitoring and Network Security. Portfolio: https://www.freelancer.com/u/ArtisticQueens
$80 CAD trong 3 ngày
2,8
2,8

I can assist with forensic analysis of the malicious PDF to determine how it operates and extract technical evidence that can support legal documentation. The analysis will focus on safely examining the file in an isolated environment to understand how the self-launching behavior works and whether it deploys or connects to components such as the Charon malware family. I will investigate the PDF structure, embedded scripts, and payload triggers to identify how the malware executes. The investigation will include: • Static analysis of the PDF (embedded JavaScript, objects, payload references) • Behavior analysis in a controlled sandbox to observe execution and persistence • Identification of file modifications and dropped artifacts • Review of network activity and potential command-and-control connections • Extraction of indicators such as hashes, domains, IP addresses, and file paths You will receive a clear forensic report summarizing the malware behavior, origin indicators, and technical evidence gathered during the investigation. The report will document findings in a structured format suitable for technical review or legal follow-up. Best Regards, Shabahat Habib...
$20 CAD trong 7 ngày
0,0
0,0

⭐Timeline: 5 days | Cost: 60CAD | Proven experience⭐ I've successfully completed projects like this before, analyzing malware and gathering evidence for cybersecurity and legal purposes. From my experience, the core challenge is safely dissecting PDF malware like self-launching Charon, tracking file modifications, network activity, and identifying origins without compromising systems. I will perform thorough analysis, document all findings, and provide a detailed, clear report suitable for legal review. This project is straightforward for me, and I’m confident I can deliver actionable insights and a fully documented investigation. I’m ready to collaborate and get started immediately: let’s make this a reality.
$60 CAD trong 5 ngày
0,0
0,0

I received a negative review due to a client repeatedly adding unpaid tasks beyond the agreed scope. The original project was completed successfully, and I’m confident my skills align well with your needs. Hi, I can help you conduct a structured forensic analysis of the suspected malicious PDF and document findings in a way that supports potential legal action. My approach would include: • Static analysis of the PDF (embedded scripts, objects, launch actions, obfuscation techniques) • Controlled dynamic analysis inside an isolated sandbox/VM to observe behavior • Monitoring file system changes, registry modifications, spawned processes, and persistence mechanisms • Capturing and reviewing network traffic (DNS, HTTP/S, IP connections) • Identifying indicators of compromise and potential origin clues All findings will be documented clearly, including timestamps, hashes (SHA256), extracted artifacts, and screenshots/log excerpts where relevant. The final report will be structured for evidentiary use, with technical detail but written in a way a non-technical legal team can follow. If you can share: – The PDF sample – OS environment where it executed – Any existing logs I can begin immediately. Timeline: 1 day Budget: $20 CAD
$20 CAD trong 1 ngày
0,0
0,0

Hi There, I have 5+ years of experience in Malware Analysis and Reverse Engineering. I have expert knowledge of assembly language. I have good hands-on experience on dotPeek, IDA, x64 dbg.I have a dedicated environment setup for malware analyses means in a host-based environment setup combined with Linux and windows. There are two steps that I would be following in analyzing the malware are static, dynamic, and code-level analysis. Based on the coding architecture I would use a platform for debugging the sample, Like if it is written in C++ then I will be using dotPeek to reverse the code and analyze how the sample interacts with the system. We can even look at whether it is a dropper or not. Most I would be focusing on API calls because we get to know their functionality and behaviour from those calls. I can assure you that, I will be an ideal candidate for what you are looking for. Please reach out to me for further discussions. Thank you
$30 CAD trong 7 ngày
0,0
0,0

Whitby, Canada
Thành viên từ thg 3 4, 2026
₹1250-2500 INR/ giờ
₹750-1250 INR/ giờ
$15-25 USD/ giờ
$10-30 USD
₹1500-12500 INR
€250-400 EUR
₹1500-12500 INR
$30-250 AUD
₹600-1500 INR
tối thiểu 36 GBP£/ giờ
₹37500-75000 INR
$2-8 USD/ giờ
₹600-1500 INR
$30-250 USD
£250-750 GBP
₹1500-12500 INR
₹600-1500 INR
₹75000-150000 INR
₹600-1500 INR
$250-750 USD