
Closed
Posted
Paid on delivery
Two business-critical files remain encrypted after a recent ransomware incident. The rest of the environment has already been wiped and rebuilt — I only need these two specific files decrypted so I can confirm data integrity before moving forward. Situation Ransomware variant currently unknown Partial ransom note available (no attacker communication) Clean backup from 22 Aug 2025 available for comparison or key analysis What I will provide Two encrypted ZIP files (approx. 5 GB and 300 MB) Partial ransom note and preserved system artifacts Copy of the 22 Aug 2025 backup if needed for reference blocks or plaintext comparison Deliverables Successfully decrypted versions of both files in their original formats Short technical summary explaining the method or tooling used (for verification or reproduction) I do not require full incident response, forensic imaging, or broader system recovery — only file decryption and a concise explanation. If you use tools such as Ghidra, IDA Pro, custom scripts, or other reverse-engineering utilities, that’s fine — just document your process. Budget & Payment Terms Total budget: $1,000 USD (fixed). $500 released after successful decryption and verification of the first file Remaining $500 released after the second file is decrypted and confirmed intact No upfront payment. All files must be readable and validated before milestone release.
Project ID: 40248633
34 proposals
Remote project
Active 16 days ago
Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
34 freelancers are bidding on average $1,027 USD for this job

With my extensive experience in decryption and cybersecurity, I understand the critical nature of your project. The ransomware incident has left you with two encrypted files, and I can provide the expertise needed to decrypt them and ensure the integrity of your data. In the realm of cybersecurity, I have successfully worked on similar projects, decrypting files and providing concise explanations of the methods used. My track record in handling sensitive data and delivering results aligns perfectly with your requirements. I am ready to take on the challenge and decrypt your files efficiently and securely. Let's get in touch to discuss the specifics of the project and how I can assist you in achieving your goals.
$1,200 USD in 20 days
6.2
6.2

With your encrypted files still held hostage, you need someone who can skillfully maneuver through the complexities of ransomware decryption to rescue your data. Look no further than me, Muhammad Zeeshan. I have over 6 years of experience as a Senior Full Stack Developer, and my skills in C Programming, Computer Security, and Data Analysis make me a prime candidate for your project. It's important for you to know that I'm not just a competent professional, but also a diligent one. I approach every task with a meticulous and thorough mindset, leaving no room for errors or shortcuts. I understand the critical nature of your situation and assure you of my unwavering commitment to getting the job done accurately, comprehensively, and on time. Additionally, my budget-friendly approach aligns well with your financial needs while ensuring top-notch solutions. My aim is always to provide the Best Quality work at a Fast Speed with uncompromising Hard Work. You can trust me to deliver exactly what you need: successfully decrypted files and a clear technical summary explaining my process so you have complete verification and future reproducibility.I sincerely look forward to working with you on this crucial project and helping you regain access to your valuable data right away.
$751 USD in 4 days
5.9
5.9

مرحباً، عميلي العزيز. أتمنى أن تكون بخير. أعمل في مجال الهندسة العكسية، والأدلة الجنائية الرقمية، وفك تشفير برامج الفدية منذ أكثر من سبع سنوات، وقد نجحت في استعادة ملفات مشفرة من أكثر من 40 عائلة مختلفة من برامج الفدية. سأقوم بتحليل ملفيك المشفرين، ورسالة الفدية، وملفات النظام المحفوظة، وسأستخدم نسخة احتياطية بنص عادي بتاريخ 22 أغسطس 2025 لإجراء هجوم نص عادي معروف إذا لزم الأمر لاستعادة مفتاح التشفير. أوافق تماماً على شروط الدفع الخاصة بك. يُستحق دفع 500 دولار أمريكي فقط بعد فك تشفير الملف الأول والتحقق منه. يُستحق دفع المبلغ المتبقي وقدره 500 دولار أمريكي فقط بعد فك تشفير الملف الثاني والتأكد من سلامته. لا أحتاج إلى الوصول إلى أي من أنظمتك، فقط الملفات والبيانات التي حددتها لإتمام العمل.
$750 USD in 7 days
5.1
5.1

Hello, First of all, I’m really sorry you’re dealing with this. I truly understand how stressful a ransomware situation can be — I’ve personally faced a similar incident before and successfully resolved it, so I know the urgency and the importance of recovering critical files safely and properly. I’m absolutely ready to help you approach this professionally and methodically. Given that you have: The encrypted ZIP files A partial ransom note Preserved artifacts A clean backup from 22 Aug 2025 There is a realistic path to analysis, especially if we can identify the ransomware family or leverage known-plaintext comparison from the backup. I’m comfortable working with reverse-engineering and analysis tools, and I will document the technical process clearly so you can understand what was done and reproduce or verify it if needed. I respect your milestone structure and payment terms. I’m prepared to proceed step-by-step: Decrypt and validate the first file Provide a concise technical explanation Then move to the second file Most importantly, I’m genuinely motivated to help you resolve this. I know how critical business data can be, and I’d be glad if I can help you recover it and move forward with confidence. Ready to begin whenever you are. Best regards, Beshoy
$1,000 USD in 5 days
4.4
4.4

Hello, I hope this message finds you well. I am writing to express my interest in your project seeking a Ransomware Decryption Specialist. With extensive experience in reverse engineering, encryption, and digital forensics, I am well-prepared to tackle the decryption of your critical files. I understand the urgency and importance of your situation, having dealt with similar ransomware incidents in the past. My background in C Programming and scripting, combined with proficiency in tools like Ghidra and IDA Pro, equips me to effectively analyze and decrypt the files. Additionally, my skills in data analysis and technical documentation will ensure a clear explanation of the methods used, providing transparency and reproducibility. To address your specific needs, I will begin by thoroughly analyzing the provided artifacts and ransom note to identify potential decryption keys or weaknesses. The clean backup from August 2025 will serve as a valuable reference for comparison and key analysis. I am confident in my ability to deliver decrypted files, verified for data integrity, based on my past success in similar projects. Could you provide more details on the encryption methods suspected, if any, and any additional context from the partial ransom note that could assist in the decryption process? Understanding these nuances will help tailor my approach to your specific case. I am eager to bring my expertise to your project and look forward to the opportunity to help restore your critical data. Thank you for considering my proposal. Best regards, Dragan M.
$800 USD in 5 days
3.7
3.7

Hello, I understand the urgency and critical nature of your situation regarding the encryption of two essential business files following a ransomware incident. With my experience in decryption, particularly in scenarios involving unknown ransomware variants, I am well-prepared to assist you in restoring access to your files securely. I will focus on decrypting both ZIP files while utilizing the clean backup from August 22, 2025, and other artifacts you provide. My methodology will include reverse-engineering and leveraging tools such as Ghidra or IDA Pro, as needed. For your peace of mind, I will provide a concise technical summary outlining the methods used for verification. I acknowledge the structured payment terms and can ensure that both files will be decrypted successfully and validated before any milestone release. Looking forward to discussing this further and helping you get your files back! Best regards, Ivaylo
$1,250 USD in 4 days
3.8
3.8

Hello, I’m excited about the opportunity to contribute to your ransomware file recovery project focused on decrypting two specific encrypted ZIP files and validating data integrity against your clean 22 Aug 2025 backup. With my expertise in Computer Security, Reverse Engineering, Digital Forensics, Encryption, C Programming, Scripting, Data Analysis, Technical Documentation, and Research Writing, and a strong focus on clean, scalable implementation, I can deliver a solution that aligns perfectly with your goals. I’ll tailor the work to your exact requirements, starting by identifying the ransomware family from the note/artifacts, checking reputable decryptor options, and then using controlled analysis to recover the original files and verify them against known-good reference data. You can expect clear communication, fast turnaround, and a high-quality result that fits seamlessly into your existing workflow. Best regards, Juan
$1,125 USD in 7 days
3.5
3.5

Hi there, Good morning I am Talha. I have read you project details i saw you need help with Digital Forensics, C Programming, Computer Security, Risk Assessment, Technical Documentation, Reverse Engineering, Encryption, Research Writing, Scripting and Data Analysis I am excited to submit my proposal for your project, which focuses on a comprehensive project plan. To begin, we will thoroughly understand your project's objectives and requirements, ensuring alignment on scope and goals. We will provide a clear and realistic project timeline with manageable milestones to ensure timely completion Please note that the initial bid is an estimate, and the final quote will be provided after a thorough discussion of the project requirements or upon reviewing any detailed documentation you can share. Could you please share any available detailed documentation? I'm also open to further discussions to explore specific aspects of the project. Thanks Regards. Talha Ramzan
$750 USD in 11 days
3.4
3.4

Hello, good luck. I've understood the requirements clearly. You need targeted recovery of two ransomware-encrypted files, validation against backup data, and documented methodology. This aligns with my experience analyzing corrupted data, storage formats, and system-level debugging. From my experience, there are 3 challenges in this job. 1. Unknown ransomware variant and encryption method. 2. Partial artifacts or missing key material. 3. Large encrypted file integrity validation. To fix them, I’ll use safe reverse-analysis workflow, header/pattern comparison with backups, controlled tooling, and checksum-based validation to confirm file integrity. If you’re interested, I’d be happy to discuss your goals in more detail. Thanks for your time Dimitar
$1,000 USD in 7 days
2.6
2.6

Hello, I went through your project carefully, and the core challenge is clear: you need to decrypt two business-critical files that remain locked after a ransomware attack. This isn’t a surface-level task , it requires someone who understands reverse engineering and cryptography to execute the decryption swiftly and effectively. I’ve handled similar cases where precision and speed were paramount. My approach involves analyzing the partial ransom note, comparing it against the backup from August 22, 2025, and utilizing advanced tools like IDA Pro or custom scripts to extract the decryption keys. No guesswork, no bloated process, just results that stand the test of integrity. If this aligns, I can start immediately and deliver both decrypted files along with a technical summary within a week. One quick question before I proceed: do you have any additional insights on the ransomware variant that might assist in the decryption process? Best regards, Muskan
$750 USD in 2 days
2.6
2.6

Hello! I've been recommended by a Freelancer Recruiter. Nice to meet you. I've just completed a similar ransomware decryption project for another client who needed urgent access to sensitive business data. I'm the perfect fit for this job because I have extensive experience in reverse-engineering and decryption, leveraging tools like Ghidra, IDA Pro, and custom scripts to extract data from encrypted files. Given the unique circumstances of this project, I'll utilize my expertise in ransomware variants and decryption techniques to successfully extract the contents of both files. I can provide a short technical summary explaining the method or tooling used, and I'll document every step of the process for your verification. I have multiple 5-star reviews on decryption projects for sensitive business data. Happy to hop on a quick call (no obligation) to discuss architecture, timeline, and a clear plan + quote. Chris | Lead Developer | Novatech
$1,500 USD in 7 days
3.2
3.2

Hello, I can decrypt those two critical files swiftly and securely. Given the ransomware variant is unknown, I’ll first analyze the encrypted ZIP files and the partial ransom note for clues regarding the encryption method used. With over a decade of experience in cybersecurity and data recovery, I have successfully decrypted files in similar incidents using tools like Ghidra and custom scripts. I’ll ensure both files are restored to their original formats while providing a detailed summary of the decryption process for your verification. My approach will involve: 1. Analyzing the encryption algorithm employed to target the files. 2. Using the clean backup from August 22, 2025, to assist in data integrity checks and plaintext comparisons. To tailor my strategy, could you clarify: - Are there any specific software environments or constraints I should be aware of? - Do you have any additional context about the files that might aid in the decryption process? I’m ready to start immediately and will ensure both files are decrypted effectively and efficiently. Let’s resolve this promptly.
$750 USD in 7 days
0.7
0.7

Hello, thanks for the clear brief. I’ve worked on targeted ransomware recovery where the goal is not full incident response but precise file‑level decryption. With the encrypted ZIPs, the partial ransom note and your clean Aug 2025 backup, I can analyse the encryption pattern, identify possible key reuse or structural weaknesses, and attempt decryption using safe reverse‑engineering methods. I’ll provide validated decrypted files plus a short technical summary of the process. No upfront payment is fine — milestones tied to successful verification work for me. If you’re ready to proceed, I can begin the analysis right away.
$1,200 USD in 15 days
0.8
0.8

I specialize in ransomware decryption and can help recover your business-critical files. Utilizing advanced tools like Ghidra and my experience in handling unknown ransomware, I ensure data integrity with a concise technical summary for verification. Let's restore your files and get you back on track.
$1,500 USD in 7 days
0.0
0.0

Hello With graceful enthusiasm, this project aligns perfectly with my expertise—I can deliver it flawlessly. I'm truly excited about the opportunity to collaborate with you. Let's chat for more details. Warm regards, Sophia
$1,125 USD in 14 days
0.0
0.0

Hi, I’ll be direct successful decryption depends entirely on the ransomware variant and whether a known weakness or key recovery path exists. It’s not always guaranteed, but with the artifacts and clean backup you have, there’s a solid chance to attempt structured recovery rather than guesswork. I can take a focused approach: analyze the encrypted files and ransom note, identify the variant (or closest match), and attempt decryption via known tools, pattern analysis, or custom scripting using your backup for reference/partial plaintext alignment. The goal is to recover both files cleanly and verify integrity—not just produce corrupted outputs. You’ll receive decrypted files (if recoverable) along with a concise technical summary of the method used so results can be validated. Portfolio: https://www.freelancer.com/u/proggon If you’re ready, share the sample artifacts and I’ll assess feasibility before proceeding. Best regards, Wahaj
$1,000 USD in 20 days
0.0
0.0

You are not looking for a coder. You are looking for someone who can build this properly. That is exactly why your project stood out. Your requirement to decrypt two business-critical encrypted ZIP files post-ransomware, using available artifacts and a clean backup, reflects a precise and focused recovery effort rather than a broad remediation, matching our approach of targeted, outcome-driven solutions. At DigitaSyndicate, a UK-based digital systems agency, we build precision-engineered automation and secure, future-proof solutions designed for performance and long-term reliability. Our expertise in reverse engineering and cryptographic analysis ensures a streamlined process that respects your scope, emphasizing accuracy and verification. We recently completed a similar recovery involving ransomware-locked data using bespoke tooling and detailed artifact analysis. Can you share your main priorities and timeline so I can map out the right execution plan for you? Casper M. Project Lead | DigitaSyndicate Precision-Built Digital Systems.
$1,150 USD in 14 days
0.0
0.0

Hello, I’ve reviewed your need to recover two business-critical ZIPs after a ransomware event and I’m confident I can recover them without full incident response. I have practical experience with LLMs, Transformers, chatbots, classification, and vector search for automating analysis, and deep hands-on experience in reverse engineering, cryptanalysis, and forensic recovery using tools like Ghidra, IDA Pro, and custom C/Python tooling. I will first analyze the ransom note and artifacts to identify the cipher/keystore, compare blocks with your 22 Aug 2025 backup to locate plaintext/ciphertext alignments, and attempt key recovery or targeted decryption of each ZIP. Deliverables: decrypted files and a concise technical summary of methods and tooling used. I can begin immediately and prioritize integrity verification for milestone releases. Can you confirm whether the 22 Aug 2025 backup contains raw copies of the exact files (same filenames and sizes) and whether any file headers or partial plaintext blocks are present that we can use for known-plaintext analysis? Best regards, Cindy Viorina
$750 USD in 6 days
0.0
0.0

As a Full-Stack developer and expert in C programming and Encryption, I have the precise skills necessary to tailor an effective and time efficient solution for your immediate needs. My ability to think outside the box is a invaluable component when it comes to successfully decrypting complicated files, which is exactly why I should be your top choice for this job. In the event of a ransomware attack, my previous experience in reverse-engineering as well as using tools like Ghidra and IDA Pro will prove useful. These specialized skills plus my proficiency in reading system artifacts are key qualifications that set me apart from others. Moreover, having worked extensively with large encrypted files before, I'm confident in my ability not only to decrypt your files without compromise but also to deliver thorough documentation illustrating the process. I value open communication, and through every step of the project, I'll keep you fully updated. In addition, I can guarantee completion of the task within our estimated timeframe and budget constraints. Choosing me means choosing expertise mixed with utmost dedication to deliver quality results without compromises. Contact me so we can discuss further on how I can be of great value to you
$750 USD in 3 days
0.0
0.0

Hello, I will decrypt the two critical files encrypted in your recent ransomware incident. Given the nature of ransomware, I will identify the encryption method used and devise a decryption strategy. I have successfully handled similar decryption projects involving various ransomware strains, restoring critical data for businesses. My expertise in reverse engineering and cryptography ensures a reliable outcome. **Solution Approach:** - Analyze the partial ransom note for clues on encryption algorithms. - Use tools like Ghidra or custom scripts to reverse-engineer the encryption. - Validate the clean backup from August 22, 2025, for potential key recovery. - Document the decryption process for verification and future reference. - Ensure the integrity of the decrypted files against the backup comparison. - Provide a concise technical summary detailing the methods used. **Smart Questions:** - Do you have any additional artifacts that might aid in identifying the ransomware variant? - Are there specific file types that need priority in the decryption process? - What are your expectations regarding the timeline for decryption? I’m ready to start immediately and focus on restoring your critical data. Let’s get these files decrypted.
$750 USD in 7 days
0.0
0.0

Cairo, Egypt
Payment method verified
Member since Jun 20, 2016
$30-250 USD
$250-750 USD
$30-250 USD
$10-30 USD
$2-8 USD / hour
₹10000-20000 INR
₹600-1500 INR
₹1500-12500 INR
$10-30 CAD
$2-8 USD / hour
£250-750 GBP
$10-30 USD
$250-750 USD
$15-25 USD / hour
$30-250 USD
$250-750 USD
₹600-1500 INR
₹750-1250 INR / hour
€8-30 EUR
£250-750 GBP
$250-750 USD
₹750-1250 INR / hour
₹12500-37500 INR
$10-30 USD
₹750-1250 INR / hour