Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Emissary

Emissary

Emissary is a Trojan that has been used byLotus Blossom. It shares code withElise, with both Trojans being part of a malware group referred to as LStudio.[1]

ID: S0082
Type: MALWARE
Platforms: Windows
Version: 1.3
Created: 31 May 2017
Last Modified: 02 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Emissary uses HTTP or HTTPS for C2.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Variants ofEmissary have added Run Registry keys to establish persistence.[2]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Emissary has the capability to create a remote shell and execute specified commands.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

Emissary is capable of configuring itself as a service.[2]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

The C2 server response to a beacon sent by a variant ofEmissary contains a 36-character GUID value that is used as an encryption key for subsequent network communications. Some variants ofEmissary use various XOR operations to encrypt C2 data.[1]

EnterpriseT1615Group Policy Discovery

Emissary has the capability to executegpresult.[2]

EnterpriseT1105Ingress Tool Transfer

Emissary has the capability to download files from the C2 server.[1]

EnterpriseT1027.001Obfuscated Files or Information:Binary Padding

A variant ofEmissary appends junk data to the end of its DLL file to create a large file that may exceed the maximum size that anti-virus programs can scan.[2]

.013Obfuscated Files or Information:Encrypted/Encoded File

Variants ofEmissary encrypt payloads using various XOR ciphers, as well as a custom algorithm that uses the "srand" and "rand" functions.[1][2]

EnterpriseT1069.001Permission Groups Discovery:Local Groups

Emissary has the capability to execute the commandnet localgroup administrators.[2]

EnterpriseT1055.001Process Injection:Dynamic-link Library Injection

Emissary injects its DLL file into a newly spawned Internet Explorer process.[1]

EnterpriseT1218.011System Binary Proxy Execution:Rundll32

Variants ofEmissary have used rundll32.exe in Registry values added to establish persistence.[2]

EnterpriseT1082System Information Discovery

Emissary has the capability to execute ver and systeminfo commands.[2]

EnterpriseT1016System Network Configuration Discovery

Emissary has the capability to execute the commandipconfig /all.[2]

EnterpriseT1007System Service Discovery

Emissary has the capability to execute the commandnet start to interact with services.[2]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp