Threat intelligence

LCRYX Ransomware Utilizes Weak Encryption, Demands $500 Bitcoin Payment

by Security News

The SonicWall Capture Labs threat research team has recently been tracking LCRYX ransomware. LCRYX is a VBScript-based ransomware strain that first emerged in November 2024 and reappeared in February 2025 with enhanced capabilities. It specifically targets Windows systems, employing a combination of Caesar cipher and XOR encryption to lock files before demanding a $500 ransom in Bitcoin for decryption. While it made its resurgence in February, it is still being seen in the wild today.

Infection Cycle

After initiating the script, the malware can be seen using 100% CPU while encrypting files on the system. The names of encrypted files have “.lcryx” appended to them:

1.png
Figure 1: CPU usage during encryption

For persistence after reboot, it creates the following registry entry:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\MyStartupScript: <script name>

During the encryption process, the following text file is brought up on the desktop:

2.png
Figure 2: Ransom message

An image version of the ransom message is downloaded from a link hosted on Mediafire:

3.png
Figure 3: Download of ransom message

The downloaded image is displayed on the desktop background:

4.png
Figure 4: Ransom message desktop background image

The malware decides on what directories to encrypt based on the Windows version:

5.png
Figure 5: Deciding on directories to encrypt

It disables real-time monitoring and third-party antivirus software:

6.png
Figure 6: Disabling system protection

The malware contains a list of system administration and antivirus software to kill if running:

7.png
Figure 7: Killing system administration apps

It blocks access to Google and various antivirus sites by editing the hosts file:

8.png
Figure 8: Blocked sites

It targets any attached USB drives:

9.png
Figure 9: USB drives targeted

The XOREncryptDecrypt function is very simple and uses a basic XOR algorithm in the variant we analyzed. The algorithm is weak, and the key can be easily unraveled using cryptanalysis tools:

10.png
Figure 10: Basic XOR encryption function

SonicWall Capture Labs provides protection against this threat via the following signature:

• GAV: Lcryx.RSM (Trojan)

This threat is also detected by SonicWall Capture ATP w/RTDMI and the Capture Client endpoint solutions.

Share This Article

An Article By

Security News

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.

Related Articles

  • Microsoft Security Bulletin Coverage for May 2025
    Read More
  • Threat Actors Caught Using Telegram Bot to Harvest Credentials
    Read More