
Käynnissä
Julkaistu
Maksettu toimituksen yhteydessä
I'm seeking a skilled professional to analyze PDF malware. The goal is to gather evidence for legal actions. Key tasks include: - Investigating self-launching Charon: We need to understand its behavior and gather evidence of its operation. - Evidence gathering: Focus on file modifications, malware origin, and network activity logs. - Detailed reporting: Provide comprehensive reports on findings. Ideal skills and experience: - Expertise in malware analysis - Experience with PDFs and associated threats - Strong background in cybersecurity - Familiarity with Charon and similar malware - Excellent reporting skills
Projektin tunnus (ID): 40275647
9 ehdotukset
Etäprojekti
Aktiivinen 9 päivää sitten
Aseta budjettisi ja aikataulu
Saa maksu työstäsi
Kuvaile ehdotustasi
Rekisteröinti ja töihin tarjoaminen on ilmaista

Hi,\n\nAnalyzing PDF malware like Charon requires precision, and I understand the urgency of gathering evidence for legal proceedings. Having spent the last 6 years specializing in malware analysis, I have the expertise to delve into its behavior, focusing on file modifications, malware origins, and network activity.\n\nI will utilize advanced forensic tools to dissect the self-launching mechanism of Charon, ensuring we capture every critical detail. My robust reporting skills will allow for comprehensive documentation of findings, providing you with clear insights essential for legal actions. \n\nThanks,\nZeeshan
$15 CAD 1 päivässä
4,9
4,9
9 freelancerit tarjoavat keskimäärin $32 CAD tätä projektia

Hello , I've just reviewed your project description regarding the PDF Malware Analysis Specialist and I'm confident in my ability to meet your expectations. With over 7 years of experience as a Senior Graphic Designer, I possess a strong skill set in Risk Management, Computer Security, Network Monitoring, Penetration Testing, Network Security, PDF, Data Analysis and Digital Forensics I kindly request you to take a moment from your busy schedule to explore our portfolio, where you can see the quality of my work and read feedback from previous clients: [Portfolio Links] https://www.freelancer.com/u/afshan2176 Could you please specify the final file formats you'll require? Feel free to award me the project so that we can discuss it further. Looking forward to connecting with you. Best regards, Afshan Z.
$10 CAD 1 päivässä
4,5
4,5

Hi There, I’ve reviewed your project details "I'm seeking a skilled professional to analyze PDF malware......" and understand your goal for “PDF Malware Analysis Specialist”. I’m Hamza, a professional artist/designer with 10+ years of experience. I’ve handled similar work using Risk Management, Network Monitoring, Penetration Testing, PDF, Data Analysis, Digital Forensics, Computer Security and Network Security — portfolio: https://www.freelancer.com/u/LionConcepts Process: requirements → draft → revisions → final delivery. Timeline fits your needs. Best, Lion Concepts
$80 CAD 3 päivässä
2,7
2,7

I can assist with forensic analysis of the malicious PDF to determine how it operates and extract technical evidence that can support legal documentation. The analysis will focus on safely examining the file in an isolated environment to understand how the self-launching behavior works and whether it deploys or connects to components such as the Charon malware family. I will investigate the PDF structure, embedded scripts, and payload triggers to identify how the malware executes. The investigation will include: • Static analysis of the PDF (embedded JavaScript, objects, payload references) • Behavior analysis in a controlled sandbox to observe execution and persistence • Identification of file modifications and dropped artifacts • Review of network activity and potential command-and-control connections • Extraction of indicators such as hashes, domains, IP addresses, and file paths You will receive a clear forensic report summarizing the malware behavior, origin indicators, and technical evidence gathered during the investigation. The report will document findings in a structured format suitable for technical review or legal follow-up. Best Regards, Shabahat Habib...
$20 CAD 7 päivässä
0,0
0,0

⭐Timeline: 5 days | Cost: 60CAD | Proven experience⭐ I've successfully completed projects like this before, analyzing malware and gathering evidence for cybersecurity and legal purposes. From my experience, the core challenge is safely dissecting PDF malware like self-launching Charon, tracking file modifications, network activity, and identifying origins without compromising systems. I will perform thorough analysis, document all findings, and provide a detailed, clear report suitable for legal review. This project is straightforward for me, and I’m confident I can deliver actionable insights and a fully documented investigation. I’m ready to collaborate and get started immediately: let’s make this a reality.
$60 CAD 5 päivässä
0,0
0,0

Hi There, I have 5+ years of experience in Malware Analysis and Reverse Engineering. I have expert knowledge of assembly language. I have good hands-on experience on dotPeek, IDA, x64 dbg.I have a dedicated environment setup for malware analyses means in a host-based environment setup combined with Linux and windows. There are two steps that I would be following in analyzing the malware are static, dynamic, and code-level analysis. Based on the coding architecture I would use a platform for debugging the sample, Like if it is written in C++ then I will be using dotPeek to reverse the code and analyze how the sample interacts with the system. We can even look at whether it is a dropper or not. Most I would be focusing on API calls because we get to know their functionality and behaviour from those calls. I can assure you that, I will be an ideal candidate for what you are looking for. Please reach out to me for further discussions. Thank you
$30 CAD 7 päivässä
0,0
0,0

I am writing to express my interest in conducting the technical analysis of the malicious PDF, with a specific focus on investigating the self-launching Charon malware and collecting legally admissible evidence. Technical Approach The project will be executed in three phases: 1. Analysis Static and dynamic examination of the PDF in a secure sandbox environment to identify auto-execution mechanisms, analyze payload behavior through reverse engineering, and extract documented Indicators of Compromise (IOCs). 2. Evidence Collection Assessment of file system changes and persistence techniques, investigation of infection vectors and malware origin, and network/log analysis to detect command-and-control (C2) activity. All evidence will be handled following proper chain-of-custody standards to support legal proceedings. 3. Reporting Delivery of a detailed technical report including attack timeline reconstruction, documentation of digital artifacts, impact assessment, and mitigation recommendations. The report will be structured for legal use. Experience & Deliverables Background in malware analysis and incident response, including malicious PDFs and exploit techniques. Deliverables include a comprehensive report, IOC list, organized evidence package, and an optional briefing session. Sincerely, Anayá Perissé
$30 CAD 10 päivässä
0,0
0,0

Whitby, Canada
Maksutapa vahvistettu
Liittynyt maalisk. 4, 2026
₹12500-37500 INR
₹1500-12500 INR
$250-750 USD
$15-25 USD/ tunnissa
₹1500-12500 INR
$50000-100000 USD
$250-750 USD
₹12500-37500 INR
$30-250 USD
₹100-400 INR/ tunnissa
min $50 USD/ tunnissa
₹12500-37500 INR
$1500-3000 USD
₹100-400 INR/ tunnissa
₹1500-12500 INR
$15-25 USD/ tunnissa
$30-250 AUD
$250-750 USD
£50-80 GBP
$250-750 USD