Looks Like This Service Is On Hold
I will do malware analysis and reverse engineering with technical report
Vetted by Fiverr Pro
Raymonda was selected by the Fiverr Pro team for their expertise.
Vetted for
Cybersecurity
About this Gig
I reverse engineer various file types (EXE, DLL, ELF, JS, VBS, etc.). You will receive a technical report detailing file behavior and identification of potential threats.
Analysis levels offered:
- Basic: Covers static analysis and sandbox behavior.
- Advanced: Performs static and dynamic analysis using reverse engineering tools (e.g., IDA, Detect-it-Easy, API Monitor). This level does not include live debugging.
- Comprehensive: Includes all advanced steps plus live debugging.
I'm also open to any requests such as creation of YARA rule for threat hunting or unpacking a file. Just let me know what you need, and we'll go from there.
FAQ
What is malware analysis and why do I need it?
To understand malware's behavior, capabilities, & impact. Identify compromised assets, extract IOCs for detection, and assist in remediation efforts.
What types of files can you analyze?
I analyze files like EXE, DLL, ELF, JS, VBS, & documents with macros. Inquire about other specific file types.
What information will I receive in the technical report?
Report details behavior, threat category, & key findings: file ID, actions, extracted strings/config, threat family, and Indicators of Compromise (IOCs).
How long does a malware analysis typically take?
Time varies based on malware complexity & analysis level. Basic may take hours; complex comprehensive analysis can take days. I provide an estimated timeline after reviewing your submission.
What if the file isn't actually malicious?
The report will clearly state if the file is benign and explain its observed behavior, confirming it poses no threat based on the analysis performed.

