Security Experts:

Connect with us

Hi, what are you looking for?



Try2Cry Ransomware Spreads via USB Drives

G Data security researchers have identified a new ransomware family that attempts to spread using infected USB drives.

G Data security researchers have identified a new ransomware family that attempts to spread using infected USB drives.

Dubbed Try2Cry, the new piece of ransomware borrows functionality from Spora, which first emerged three years ago. Written in .NET, Try2Cry features a USB worm component similar to that previously observed in the njRAT remote access Trojan.

The new piece of ransomware appears related to the “Stupid” ransomware family, which is available in open-source on GitHub.

During their investigation, G Data’s security researchers discovered multiple Try2Cry samples, including some that do not pack the worm component. They also discovered that the malware uses Rijndael, the predecessor of AES, for encryption.

“The encryption password is hardcoded. The encryption key is created by calculating a SHA512 hash of the password and using the first 32 bits of this hash (see left picture below). The IV creation is almost identical to the key, but it uses the next 16 bits (indices 32-47) of the same SHA512 hash,” the researchers explain.

The technique employed by the worm component is similar to that of Spora, Dinihou or Gamarue: the malware searches for any connected removable drives, hides a copy of itself in the root folder (a file named Update.exe), then hides all files on the drive and replaces them with non-hidden LNK files (shortcuts) that point to both the original file and Update.exe.

The ransomware would also place visible copies of itself featuring Arabic names (they translate to Very special, Important, passwords, a stranger, and The Five Origins), attempting to lure users into launching them.

Despite these efforts, the infection of the USB drive is rather easy to spot, due to the shortcut icons used for the LNK files, and the Arabic executables, G Data points out. Furthermore, files encrypted with this ransomware are decryptable, given that the malware seems to be “just one of many variants of copy & paste ransomware created by criminals who can barely program,” G Data concludes.

Related: ICS-Targeting Snake Ransomware Isolates Infected Systems Before Encryption

Related: Ransomware Operators Claim They Hacked Printing Giant Xerox

Related: Multi-Platform ‘Tycoon’ Ransomware Uses Rare Java Image Format for Evasion

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...


US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...


The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.