Empire3

Empire is fully supported by BC-Security

Demo of Empire with Starkiller is in this Red Team Village event video where I emulate APT19:

Install Empire

Install on Kali:

Install on Ubuntu:

If you are installing the newer version of Empire on the SANS Slingshot C2 Matrix Edition VM, there is a small bug because it wants Ubuntu 20.04 but slingshot is in 18.04. Replace the line in setup/install.sh with the correct version:

wget -q https://packages.microsoft.com/config/ubuntu/18.04/packages-microsoft-prod.deb

And comment the version test:

#if [ $VERSION_ID != "20.04" ]; then # echo -e '\x1b[1;31m[!] Ubuntu must be 20.04\x1b[0m' && exit #fi

Download Starkiller if you want a GUI:

Run Empire

On Kali:

Run Starkiller

Run Empire for connectivity through Starkiller if you want a GUI:

Open Starkiller:

Login to Starkiller:

  • Name: localhost:1337

  • Username: <user>

  • Password: <password>

Emulating TTPs

Will use an adversary emulation plan for APT19 as an example: https://www.scythe.io/library/threatthursday-apt19

Tactic

Description

Description

APT19 is a Chinese-based threat group that has targeted a variety of industries, including defense, finance, energy, pharmaceutical, telecommunications, high tech, education, manufacturing, and legal services.

Goal and Intent

Exist in the network to enumerate systems and information in order to maintain Command and Control to support future attacks.

Command and Control

Commonly Used Port (T1043) - TCP port 80; Standard Application Layer Protocol (T1071) - HTTP; Deobfuscate/Decode Files or Information (T1140); Data Encoding (T1132) - used Base64 to encode communications to the C2 server

Initial Access

Spearphishing attachment (T1193); Spearphishing link (T1192)

Execution

PowerShell (T1086); User Execution; Hidden Windows (T1143) - used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden; Obfuscated Files or Information (T1027) - used Base64 to obfuscate commands and the payload; DLL Side-Loading (T1073)

Discover

System Owner/User Discovery (T1033); System Information Discovery (T1082) System Network Configuration Discovery (T1016)

Persistence

Registry Run Keys/ Start up Folder (T1060) - establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\

Defense Evasion

Regsvr32 (T1117); Scripting (T1064) - downloaded and launched code within a SCT file to bypass application whitelisting techniques

Listeners

Create Listener

Stagers

Generate Stager HTA:

Generate Stager SCT:

Generate Stager DLL:

Download the stagers to /tmp and serve with SimpleHTTPServer

Initial Access

Email with link to Resume.hta

Execution

Show execution of HTA file:

Migrate to another process with reflective PE Injection: https://www.bc-security.org/post/reflective-pe-injection-in-windows-10-1909/

Discovery

Persistence

Open regedit HKCU\Software\Microsoft\Windows\CurrentVersion

Defense Evasion

Execution with regsvr32 and scripting. Created a shortcut called Chrome with Target set as:

Upload

Other Resources

Last updated

Was this helpful?