You mean at the front of the byte stream? Like how keys in a key file will have prefix and postfix data saying what they are and who made them, or whatever.
I don't really know if individual encrypted files have that sort of thing, I've never inspected one. It seems like a bad idea if they do.
Otherwise if they just find an encrypted file lying around, something you're expected to explicitly run back through a decryption program and that can't decrypt itself, that would be hard to approach.
But speaking of the number of characters, how could they know at all? I see this implicit assumption made a lot in password discussions, and of course a longer password is more secure all else being equal. But if you just have an empty field to enter the password, and it can accept an arbitrary number of characters, how could you possibly know how many characters to try? You'd just have to start at 1 character and keep increasing, and so logically, the brute force would simply take longer to solve the longer password. But at a certain point of not-that-many-characters the amount of time required approaches the heat death of the universe.