Empire3
Empire is fully supported by BC-Security
Last updated
Empire is fully supported by BC-Security
Last updated
Demo of Empire with Starkiller is in this Red Team Village event video where I emulate APT19:
Install on Kali:
Install on Ubuntu:
If you are installing the newer version of Empire on the SANS Slingshot C2 Matrix Edition VM, there is a small bug because it wants Ubuntu 20.04 but slingshot is in 18.04. Replace the line in setup/install.sh with the correct version:
wget -q
https://packages.microsoft.com/config/ubuntu/18.04/packages-microsoft-prod.deb
And comment the version test:
#if [ $VERSION_ID != "20.04" ]; then # echo -e '\x1b[1;31m[!] Ubuntu must be 20.04\x1b[0m' && exit #fi
Download Starkiller if you want a GUI:
On Kali:
Run Empire for connectivity through Starkiller if you want a GUI:
Open Starkiller:
Login to Starkiller:
Name: localhost:1337
Username: <user>
Password: <password>
Will use an adversary emulation plan for APT19 as an example: https://www.scythe.io/library/threatthursday-apt19
Tactic
Description
Description
APT19 is a Chinese-based threat group that has targeted a variety of industries, including defense, finance, energy, pharmaceutical, telecommunications, high tech, education, manufacturing, and legal services.
Goal and Intent
Exist in the network to enumerate systems and information in order to maintain Command and Control to support future attacks.
Command and Control
Commonly Used Port (T1043) - TCP port 80; Standard Application Layer Protocol (T1071) - HTTP; Deobfuscate/Decode Files or Information (T1140); Data Encoding (T1132) - used Base64 to encode communications to the C2 server
Initial Access
Spearphishing attachment (T1193); Spearphishing link (T1192)
Execution
PowerShell (T1086); User Execution; Hidden Windows (T1143) - used -W Hidden
to conceal PowerShell windows by setting the WindowStyle parameter to hidden; Obfuscated Files or Information (T1027) - used Base64 to obfuscate commands and the payload; DLL Side-Loading (T1073)
Discover
System Owner/User Discovery (T1033); System Information Discovery (T1082) System Network Configuration Discovery (T1016)
Persistence
Registry Run Keys/ Start up Folder (T1060) - establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\
Defense Evasion
Regsvr32 (T1117); Scripting (T1064) - downloaded and launched code within a SCT file to bypass application whitelisting techniques
Create Listener
Generate Stager HTA:
Generate Stager SCT:
Generate Stager DLL:
Download the stagers to /tmp and serve with SimpleHTTPServer
Email with link to Resume.hta
Show execution of HTA file:
Migrate to another process with reflective PE Injection: https://www.bc-security.org/post/reflective-pe-injection-in-windows-10-1909/
Open regedit HKCU\Software\Microsoft\Windows\CurrentVersion
Execution with regsvr32 and scripting. Created a shortcut called Chrome with Target set as:
Using Empire with Starkiller: How to from BC-Security