Pronunciation: En-cry-fer-X
Encryfer-X is malicious software written in Rust, designed to encrypt files on an infected system. It recursively scans the system and applies strong encryption algorithms to render files inaccessible. A decryption tool is required to recover encrypted files.
Created by @5mukx
Algorithms Used: AES-256, ChaCha20Poly1305
⚠️ Note: This ransomware is in an early stage, created for educational and research purposes only. It is not intended to harm or disrupt others. Significant changes have been made in the private repository, with advanced techniques to be released later.
Future Plans (Private):
⚠️ Warning: This content is for educational purposes only. The author is not responsible for misuse or negative consequences resulting from the use of this tool.
⚠️ Note: All features, including recursive volume encryption, are enabled by default. To test safely, comment out or modify the relevant functions.
To build the code:
cargo build --release
The binary file is located at: ./target/release/Encryfer-X.exe
⚠️ Note: You need two components: a 32-byte AES key and an encrypted hex value containing AES-256 with ChaCha20Poly1305.
⚠️ Info: This is a demo version for learning how ransomware operates. The key combinations are basic and detectable by EDR sensors. The private rewritten version includes advanced key obfuscation, sleep obfuscation, and CVE exploits. Do not request access.