This is a writeup I did about rcrypt a few months back in PDF format for those interested in how rcrypt works. In addition to some general information this writeup shows some reverse engineering analysis and a test case given a sample of known malware in the context of AV evasion. Fun for the whole family!
File: rcrypt writeup
MD5 Sum: 10c73cc7f922c7baea6d33c35180d19a
SHA1 Sum: c05775934ab46c69bb53164a7c3fca3d9ec75b15