MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Suncrypt


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824
SHA3-384 hash: 9e58f5762ab5b4361391123c8846b49ec8365b703939a3b2f9db041a8e0e0e7357f7ee1325a06e8ff07be7e05d2778d3
SHA1 hash: 7710f609e7623a08f0dd7cb8fae1ff38d0c729ef
MD5 hash: 8e2ccd9284e09ccc4e9eef325a83b435
humanhash: single-nitrogen-bacon-blossom
File name:8e2ccd9284e09ccc4e9eef325a83b435.bin
Download: download sample
Signature Suncrypt
File size:435'712 bytes
First seen:2020-12-03 15:33:46 UTC
Last seen:2020-12-03 18:00:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fc901cea0dbc07592dc00499830db9f3 (1 x Suncrypt)
ssdeep 6144:K0/7NJkOEB5ytGGhbRPRVwHHGG8odjNU8a/qEmnsGMi7Y2NAOxe:L7LEB5ytPhblwHmVodRPoIsW7+
Threatray 72 similar samples on MalwareBazaar
TLSH C5946B2280BB765FF147F4F52579757B387BDA30A0228EA28F9CDB3CA0946D1124593E
Reporter Sapphirex00
Tags:Ransomware Suncrypt

Intelligence


File Origin
# of uploads :
2
# of downloads :
350
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
Launching a service
Launching a process
Sending a UDP request
Creating a file
Changing a file
Modifying an executable file
Replacing files
Creating a file in the %temp% subdirectories
Moving a file to the %temp% subdirectory
Replacing executable files
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Creating a file in the %AppData% directory
Reading critical registry keys
Moving a recently created file
Stealing user critical data
Creating a file in the mass storage device
Encrypting user's files
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Suncrypt
Detection:
malicious
Classification:
rans.evad
Score:
68 / 100
Signature
Found Tor onion address
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Writes many files with high entropy
Yara detected Suncrypt Ransomware
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.SunCrypt
Status:
Malicious
First seen:
2020-12-01 03:17:30 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
ransomware spyware
Behaviour
Suspicious use of AdjustPrivilegeToken
Drops desktop.ini file(s)
Enumerates connected drives
Reads user/profile data of web browsers
Drops startup file
Modifies extensions of user files
Unpacked files
SH256 hash:
3f6e996ee4a40d2d19b648669d9146562627359626239324937a5c75f8030824
MD5 hash:
8e2ccd9284e09ccc4e9eef325a83b435
SHA1 hash:
7710f609e7623a08f0dd7cb8fae1ff38d0c729ef
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_XORed_URL_in_EXE
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments