A decryption tool for NAS systems infected by the ech0raix ransomware (also known as QNAP encrypt).
If your NAS has been infected by ech0raix, you're likely in one of two situations:
Identification: Creates a file named README_FOR_DECRYPT.txt
Some developers have released brute force decryptors for this older variant, making free decryption potentially possible.
Identification: Creates a file named README_FOR_DECRYPT.txtt (note the double 't')
Currently, there is no known free decryption method for these newer versions. We hope future research may provide solutions.
If you've paid the ransom and received the official decryptor binaries but want to run a virus-free alternative, follow these steps:
- Download the free version of IDA Disassembler
- Open the official decryptor binary in IDA
- Navigate to
main_mainfunction - Locate and extract the embedded key as shown below:
This tool is provided as-is for educational and recovery purposes. Always maintain backups and exercise caution when dealing with ransomware-infected systems.
Contributions, issues, and feature requests are welcome. If you've found a working method for newer variants, please share your findings.
[Add your license information here]
Note: This project is not affiliated with or endorsed by the ransomware operators. It exists solely to help victims recover their data safely.
