Banner Image

All Services

Programming & Development information security

Malware Analysis and Disassembly

$35/hr Starting at $500

I specialize in Advanced Malware Analysis and Reverse Engineering, providing deep-dive investigations into malicious software to uncover its behavior, impact, and inner workings. Whether it's ransomware, trojans, rootkits, or APTs, I meticulously analyze malware samples to extract intelligence, identify vulnerabilities, and develop defensive strategies. Using cutting-edge tools and methodologies, I break down even the most sophisticated threats, helping organizations stay ahead of attackers.

What I Offer:

🔍 Static Analysis

  • Disassembling and decompiling malware using IDA Pro, Ghidra, and Radare2
  • Extracting strings, imports, and dependencies to identify functionality
  • Detecting obfuscation, encryption, and packing techniques


🚀 Dynamic Analysis

  • Running malware in a sandboxed environment to observe real-world behavior (Cuckoo Sandbox, Any.Run)
  • Monitoring network traffic, API calls, and system modifications
  • Detecting anti-analysis techniques such as sandbox evasion and anti-debugging


🛠 Reverse Engineering

  • Debugging malware to understand execution flow (x64dbg, WinDbg, OllyDbg)
  • Analyzing C2 communication protocols, encryption mechanisms, and persistence methods
  • Extracting payloads, shellcode, and embedded exploits


📡 Behavioral & Threat Intelligence

  • Mapping malware techniques to MITRE ATT&CK TTPs
  • Identifying Indicators of Compromise (IoCs) for proactive threat hunting
  • Writing custom YARA and Sigma rules to detect similar threats in the future


⚡ Exploit & Vulnerability Analysis

  • Reverse-engineering zero-day exploits and malware-delivered vulnerabilities
  • Identifying exploitation techniques (e.g., buffer overflows, RCE, privilege escalation)
  • Analyzing process injection methods (DLL injection, process hollowing, reflective loading)


📝 Comprehensive Reporting

  • A detailed breakdown of malware behavior and capabilities
  • Code-level analysis with disassembly insights
  • Customized recommendations for mitigation and detection


About

$35/hr Ongoing

Download Resume

I specialize in Advanced Malware Analysis and Reverse Engineering, providing deep-dive investigations into malicious software to uncover its behavior, impact, and inner workings. Whether it's ransomware, trojans, rootkits, or APTs, I meticulously analyze malware samples to extract intelligence, identify vulnerabilities, and develop defensive strategies. Using cutting-edge tools and methodologies, I break down even the most sophisticated threats, helping organizations stay ahead of attackers.

What I Offer:

🔍 Static Analysis

  • Disassembling and decompiling malware using IDA Pro, Ghidra, and Radare2
  • Extracting strings, imports, and dependencies to identify functionality
  • Detecting obfuscation, encryption, and packing techniques


🚀 Dynamic Analysis

  • Running malware in a sandboxed environment to observe real-world behavior (Cuckoo Sandbox, Any.Run)
  • Monitoring network traffic, API calls, and system modifications
  • Detecting anti-analysis techniques such as sandbox evasion and anti-debugging


🛠 Reverse Engineering

  • Debugging malware to understand execution flow (x64dbg, WinDbg, OllyDbg)
  • Analyzing C2 communication protocols, encryption mechanisms, and persistence methods
  • Extracting payloads, shellcode, and embedded exploits


📡 Behavioral & Threat Intelligence

  • Mapping malware techniques to MITRE ATT&CK TTPs
  • Identifying Indicators of Compromise (IoCs) for proactive threat hunting
  • Writing custom YARA and Sigma rules to detect similar threats in the future


⚡ Exploit & Vulnerability Analysis

  • Reverse-engineering zero-day exploits and malware-delivered vulnerabilities
  • Identifying exploitation techniques (e.g., buffer overflows, RCE, privilege escalation)
  • Analyzing process injection methods (DLL injection, process hollowing, reflective loading)


📝 Comprehensive Reporting

  • A detailed breakdown of malware behavior and capabilities
  • Code-level analysis with disassembly insights
  • Customized recommendations for mitigation and detection


Skills & Expertise

MalwareMalware AnalysisMalware RemovalPenetration TestingRed Hat

0 Reviews

This Freelancer has not received any feedback.