The exe in the email iso attachment contacts Google and downloads the malware, which is decrypted and starts the infection. Data is exfiltrated by email.
The bunch of vulnerabilities in Multiple open-source embedded TCP/IP stacks, used in IoT and embedded devices, pose a immediate risk for organizations.
Zip attachment in the message contains a doc file. This, if opened, contacts a link from an internal list and downloads dll from Epoch botnets 1 and 3, which initiates malware infection.