Emissary

Malware Profile Updated 3 months ago
Download STIX
Preview STIX
Emissary is a malicious software (malware) known for its damaging and exploitative characteristics. The malware operates as a Trojan, named Emissary, that infiltrates systems through suspicious downloads, emails, or websites without the user's knowledge. Once inside a system, it can disrupt operations, steal personal information, or even hold data hostage for ransom. This Trojan runs within the Internet Explorer process and communicates with a command and control (C2) server by sending network beacons. The C2 server provides commands to the Trojan in the form of a three-digit numeric string, which the Emissary Trojan decrypts and compares to a list of commands within its command handler. The payload of the Emissary attack is unique in its use of a seed value of 1024 in its algorithm, differentiating it from similar malware like Elise, which uses a seed value of 2012. This Trojan is associated with the EMISSARY PANDA threat group, identified as originating from China. In testing scenarios conducted by SE Labs, the tactics, techniques, and procedures (TTPs) of Emissary were emulated alongside other formidable adversary groups such as Russia-nexus Turla, North Korea-nexus Kimsuky, and another China-nexus group, Ke3chang. In one instance, threat actors attempted to exploit CVE-2014-6332 to install a new version of the Emissary Trojan, specifically version 5.3. The Emissary Trojan is related to the Elise malware used in Operation Lotus Blossom, an attack campaign on targets in Southeast Asia. This Trojan provides backdoor access to compromised systems, allowing threat actors to manipulate the system at their will. Its command handler function supports six commands, enabling a broad range of disruptive activities.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Emissary Panda
1
Emissary Panda, also known as Iron Tiger, APT27, Budworm, Bronze Union, Lucky Mouse, and Red Phoenix, is a threat actor group associated with malicious cyber activities. The group has been active since at least 2013, targeting various industry verticals across Europe, North and South America, Africa
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Crowdstrike
Remote Code ...
Vulnerability
Backdoor
Exploit
Trojan
Chinese
Windows
Loader
Payload
Webshell
Espionage
China
exploited
Malware
exploitation
Sharepoint
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
HyperBroUnspecified
1
HyperBro is a malicious software (malware) that has been utilized in a sophisticated cyber espionage campaign targeting semiconductor industries primarily in Taiwan, Hong Kong, and Singapore. This malware was discovered being used in conjunction with a lure purporting to be from the Taiwan Semicondu
China ChopperUnspecified
1
China Chopper is a notorious malware that has been widely used by various Advanced Persistent Threat (APT) groups, notably BRONZE UNION. This web shell was found embedded in multiple web shells on SharePoint servers, such as stylecs.aspx, test.aspx, and stylecss.aspx. It is believed to be associated
SysUpdateUnspecified
1
SysUpdate is a malicious software variant that has been exclusively used by Budworm, also known as APT27, Emissary Panda, Bronze Union, Lucky Mouse, Iron Tiger, and Red Phoenix. In December 2020, a sample of the SysUpdate malware variant was found, with its payload being a new version of SysUpdate.
EliseUnspecified
1
Elise is a malicious software (malware) that is part of the LStudio malware group, which also includes the Emissary Trojan. Both Elise and Emissary share code overlap and utilize a custom algorithm to decrypt their configurations, using the "srand" function to set a seed value for the "rand" functio
python33.dllUnspecified
1
Python33.dll is a harmful malware that can infiltrate your system through various channels, including suspicious downloads, emails, or websites. Once inside, it can steal personal information, disrupt operations, or even hold your data hostage for ransom. This malicious software has been observed be
inicore_v2.3.30.dllUnspecified
1
The malware inicore_v2.3.30.dll is a harmful program designed to exploit and damage computer systems, often infiltrating them via suspicious downloads, emails, or websites without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for
Lucky MouseUnspecified
1
Lucky Mouse, also known as Emissary Panda, APT27, Threat Group 3390, Bronze Union, and several other names, is a malicious software (malware) attributed to a China-linked Advanced Persistent Threat (APT) group. This malware has been active since at least 2013, targeting various industry verticals fo
AntakUnspecified
1
Antak is a type of malware, specifically a webshell, that has been detected on SharePoint servers. The Antak webshell, as depicted in Figure 2, was loaded onto the server and used to upload additional tools for post-exploitation. In addition to Antak, several other webshells were also installed on t
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
BRONZE UNIONUnspecified
1
Bronze Union, also known as APT27, Emissary Panda, Lucky Mouse, Iron Tiger, and Red Phoenix, is a threat actor with alleged connections to the Chinese government. The group has been observed targeting organizations across Europe, North and South America, Africa, the Middle East, and the Asia-Pacific
Lotus BlossomUnspecified
1
Lotus Blossom, also known as Billbug and Thrip, is a threat actor that has been active since 2009, engaging in persistent cyber espionage campaigns primarily targeting government and military organizations in Southeast Asia. The group is notorious for its use of sophisticated delivery techniques and
APT27Unspecified
1
APT27, also known as Iron Taurus, is a Chinese threat actor group that primarily engages in cyber operations with the goal of intellectual property theft. The group targets multiple organizations worldwide, including those in North and South America, Europe, and the Middle East. APT27 utilizes vario
TurlaUnspecified
1
Turla, also known as Pensive Ursa, is a sophisticated threat actor linked to Russia that has been active for many years. The group is known for its advanced cyber-espionage capabilities and has been associated with numerous high-profile breaches. According to the MITRE ATT&CK and MITRE Ingenuity dat
Venomous BearUnspecified
1
Venomous Bear, also known as Turla, Urobouros, Snake, and other names, is a threat actor group attributed to Center 16 of the Federal Security Service (FSB) of the Russian Federation. The group has been active since at least 2004, targeting diplomatic and government organizations, as well as private
Ke3changUnspecified
1
Ke3chang, also known as APT15, Mirage, Vixen Panda GREF, and Playful Dragon, is a prominent threat actor that has been active since at least 2010. According to the European Union Agency for Cybersecurity (ENISA), this group has consistently targeted energy, government, and military sectors. Ke3chang
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
CVE-2014-6332Unspecified
1
None
CVE-2019-0604Unspecified
1
None
Source Document References
Information about the Emissary Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
CERT-EU
8 months ago
Cybersecurity, ICT and Media Policies | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
CrowdStrike
a year ago
CrowdStrike Scores 100% in SE Labs 2023 Q2 EAS Test | CrowdStrike
CERT-EU
a year ago
Links 18/07/2023: Akademy 2023 Videos and Debian Brainwashing
MITRE
a year ago
Attack on French Diplomat Linked to Operation Lotus Blossom
MITRE
a year ago
Emissary Panda Attacks Middle East Government SharePoint Servers
MITRE
a year ago
Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”
CERT-EU
a year ago
FBI: Crooks posing as PRC agents prey on Chinese in the US