Research

Decrypted: FunkSec Ransomware

Avast releases free decryptor for AI-assisted FunkSec ransomware
Ladislav Zezula
Malware Researcher at Gen
Published
July 29, 2025
Read time
11 Minutes
Decrypted: FunkSec Ransomware
Written by
Ladislav Zezula
Malware Researcher at Gen
Published
July 29, 2025
Read time
11 Minutes
Decrypted: FunkSec Ransomware
    Share this article

    Researchers at Avast developed a decryptor for the FunkSec ransomware. We have been cooperating with law-enforcement agencies to help victims decrypt files for free. Because the ransomware is now considered dead, we released the decryptor for public download.                                                                                                                                                                                                                                                                                                                               

    Skip directly to the decryptor download 

    We counted 113 victims of the ransomware in total (based on the ransomware leak site). Because the first victim appeared earlier than the initial source, we assume that the FunkSec gang only did data exfiltration and subsequent extortion from the beginning, and then also added data encryption. Here’s a simple timeline of the ransomware operations: 

    • 04-Dec-2024: The first victims appeared on the ransomware gang’s leak site 

    • 15-Dec-2024: The initial source file was uploaded to Virus Total 

    • 31-Dec-2024: The first known ransomware sample was uploaded to Virus Total 

    • 15-Mar-2025: The latest known victim 

    AI-Powered Ransomware 

    Sources report that AI was used to assist in writing this ransomware. Notably, the authors used AI to create tools and phishing templates, though they emphasize that AI contributes to only about 20% of their operations. 

    Overall, samples of the ransomware mostly fail to work. Some of them depend on external image (supposed to become a desktop wallpaper) downloaded from Imgur

    • hxxps[:]//i.imgur.com/HCYQoVR.jpeg
    • hxxps[:]//i.imgur.com/mlUvWYT.jpeg 

    How to Recognize FunkSec Ransomware 

    Files encrypted with FunkSec ransomware have the “.funksec” extension: 

    Also, a ransom note file called “README-{random}.md” is dropped to every folder.

    FunkSec Ransomware Analysis

    Ransomware is written in Rust programming language. For cryptographic operations, it uses orion-rs library, version 0.17.7. Files are encrypted using Chacha20 with the help of Poly1305 MAC. This hash-based method ensures integrity of encryption parameters: the encryption key, n-once, block lengths, and encrypted data itself.

    Files are encrypted per-blocks of 128 bytes, adding 48 bytes of extra metadata to each block, which means that encrypted files are about 37% bigger than the originals.

    When executed, the ransomware searches all local drives (by drive letter) and encrypts all files, except the ones with these extensions:

     

    .7z      .aac     .ai      .apk     .avi     .avro    .azw3    .bak     .bat

    .bib     .bin     .bkp     .c       .cer     .chm     .cpp     .csr     .css

    .csv     .cue     .dat     .db      .dbf     .deb     .djvu    .dll     .dmg

    .docx    .dwg     .dxf     .ear     .eml     .eps     .epub    .etl     .exe

    .fb2     .fla     .flac    .flv     .git     .gpg     .hdf5    .html    .indd

    .ini     .ipa     .iso     .jar     .java    .js      .json    .jsx     .kdbx

    .key     .log     .lst     .m3u     .md      .mdb     .midi    .mkv     .mov

    .mp3     .mp4     .msg     .msi     .nfs     .odp     .ods     .odt     .ogg

    .opf     .parquet .pdb     .pdf     .pem     .pfx     .pgp     .php     .pptx

    .ps      .psd     .py      .rar     .raw     .rpm     .rtf     .sh      .sql

    .sqlite  .svg     .svn     .tar     .tar.gz  .tex     .tgz     .tiff    .ts

    .tsx     .txt     .vcs     .vhd     .vmdk    .war     .wav     .webm    .wma

    .xlsx    .xml     .xps     .xz      .yaml    .zip

     

    The following processes and services are killed before the ransomware starts the file encryption:

     

    chrome.exe          firefox.exe         msedge.exe          explorer.exe

    outlook.exe         vlc.exe             spotify.exe         skype.exe

    discord.exe         steam.exe           java.exe            python.exe

    node.exe            cmd.exe             powershell.exe      taskmgr.exe

    wmplayer.exe        tscon.exe           notepad.exe

     

    spooler             bits                dnsclient            lanmanworkstation

    winmgmt             netsh               iphlpsvc             services

    RemoteAccess        ShellHWDetection    SCardSvr             TrkWks

    wscsvc              CryptSvc            msiserver            MpsSvc

    defragsvc           upnphost            WindowsUpdate        srservice

    wsmprovhost         AppIDSvc            AudioEndpointBuilder Schedule

    eventlog            PlugPlay            Netman               bthserv

    ShellExperienceHost SMB                 WinDefend            wuauserv

     

    How to Use the Ransomware Decryptor

    1. The first step is to download the decryptor binary. Avast provides a 64-bit decryptor, as the ransomware is also 64-bit and can’t run on 32-bit Windows. If you have no choice but to use 32-bit applications, you may download a 32-bit decryptor here.
    2. Run the executable file, preferably as administrator. It starts as a wizard, leading you through the decryption process.
    3. On the initial page, we have a link to the license information. Click the Next button when you are ready to start.

       

    4. On the next page, select the list of locations you want to be searched for and decrypted. By default, it has a list of all local drives, but you can pick a different list, such as a directory with important documents:

    5. On the final page, you can opt-in to back up your encrypted files. These backups may help if anything goes wrong during the decryption process. This choice is selected by default, which we recommend. After clicking Decrypt, the decryption process begins. Let the decryptor work and wait until it finishes decrypting all your files.

    For questions or comments about the Avast decryptor, email decryptors@avast.com.

    IOCs

    Ransomware sample

    c233aec7917cf34294c19dd60ff79a6e0fac5ed6f0cb57af98013c08201a7a1c
     

    Initial source code

    7e223a685d5324491bcacf3127869f9f3ec5d5100c5e7cb5af45a227e6ab4603

     

    Ladislav Zezula
    Malware Researcher at Gen
    Follow us for more