Inactive ransomware operator
← All groupsSuncrypt
aka Sun · 32 victims indexed · first seen 6 years ago · last activity 4 years ago
At a glance
- Status
- inactive
- Aliases
- Sun
- First seen
- 6 years ago
- Last activity
- 4 years ago
- Onion sites
- 3 known endpoints
- Primary sector
- Healthcare · 3 hits
About
References
27 linksExternal sources curated by the MISP threat-intel community.
- acronis.com/en-us/blog/posts/suncrypt-adopts-attacking-techniques-netwalker-and-maze-ransomware
- bleepingcomputer.com/news/security/suncrypt-ransomware-sheds-light-on-the-maze-ransomware-cartel/
- securityboulevard.com/2020/09/the-curious-case-of-suncrypt/
- tetradefense.com/incident-response-services/cause-and-effect-suncrypt-ransomware-analysis
- intezer.com/blog/malware-analysis/when-viruses-mutate-did-suncrypt-ransomware-evolve-from-qnapcrypt
- analyst1.com/blog/ransom-mafia-analysis-of-the-worlds-first-ransomware-cartel
- analyst1.com/file-assets/RANSOM-MAFIA-ANALYSIS-OF-THE-WORLD%E2%80%99S-FIRST-RANSOMWARE-CARTEL.pdf
- blog.chainalysis.com/reports/ransomware-connections-maze-egregor-suncrypt-doppelpaymer
- blog.minerva-labs.com/suncrypt-ransomware-gains-new-abilities-in-2022
- cdn.pathfactory.com/assets/10555/contents/394789/0dd521f8-aa64-4517-834e-bc852e9ab95d.pdf
- docs.google.com/spreadsheets/d/1MI8Z2tBhmqQ5X8Wf_ozv3dVjz5sJOs-3
- go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf
- ke-la.com/to-attack-or-not-to-attack-targeting-the-healthcare-sector-in-the-underground-ecosystem/
- medium.com/@sapphirex00/diving-into-the-sun-suncrypt-a-new-neighbour-in-the-ransomware-mafia-d89010c9df83
- medium.com/s2wlab/case-analysis-of-suncrypt-ransomware-negotiation-and-bitcoin-transaction-43a2194ac0bc
- medium.com/s2wlab/w4-july-en-story-of-the-week-ransomware-on-the-darkweb-c61965d0386a
- pcsxcetrasupport3.wordpress.com/2021/03/28/suncrypt-powershell-obfuscation-shellcode-and-more-yara/
- public.intel471.com/blog/ransomware-as-a-service-2020-ryuk-maze-revil-egregor-doppelpaymer/
- accenture.com/us-en/blogs/cyber-defense/evolving-danger-ransomware-extortion
- bleepingcomputer.com/news/security/suncrypt-ransomware-is-still-alive-and-kicking-in-2022/
Timeline
9 monthsTop countries
Top sectors
MITRE ATT&CK
12 techniques · 9 tacticsTactics
Techniques
- T1566Phishing
- T1190Exploit Public-Facing Application
- T1059Command and Scripting Interpreter
- T1055Process Injection
- T1548Abuse Elevation Control Mechanism
- T1562Impair Defenses
- T1083File and Directory Discovery
- T1135Network Share Discovery
- T1021Remote Services
- T1005Data from Local System
- T1041Exfiltration Over C2 Channel
- T1486Data Encrypted for Impact
Recent victims
Loading…
Onion infrastructure
3 known- http://nbzzb6sa6xuura2z.onion
- http://x2miyuiwpib2imjr5ykyjngdu7v6vprkkhjltrk4qafymtawey4qzwid.onion
- http://x2miyuiwpib2imjr5ykyjngdu7v6vprkkhjltrk4qafymtawey4qzwid.onion/
Source
Updated 4 years agoData on this page is sourced from the group's own leak posts, cross-checked with public ransomware trackers (RansomLook, ransomware.live, RansomWatch), MITRE ATT&CK, and our own Tor and Telegram crawlers. This is a public observatory page — share freely.
