High
A new ransomware family, dubbed Try2Cry, that appears to be a variant of the Stupid ransomware family. Various samples were analyzed with the main differences being in the level of obfuscation, use of DNGuard, and use of a worm component. The ransomware targets various user documents with Rijndael encryption using a hardcoded password. It operates as most ransomware families, iterating over files to encrypt them and leaving a ransom note on the system after completion. A more noteworthy aspect of some of the samples of this ransomware is a worming component. During execution, it looks for removable devices on the system. If any are found, it drops a hidden copy of itself onto the drive, hides all files on the device, and replaces those files with Windows Shortcuts using the same icon that instead points to the ransomware executable. Visible copies of itself and with Arabic file names are also placed on the drive in an attempt to trick the user into opening them. The researchers note that a decryptor is available for the Stupid ransomware family that also works on Try2Cry samples.
File encryption