Matanbuchus – malware-as-a-service

June 29, 2022

Matanbuchus is a malware-as-a-service that first surfaced back in 2021 but has since resurfaced; threat researchers recently discovered a malicious phishing campaign that spreads the malware in order to drop Cobalt Strike beacons on compromised machines. Cobalt Strike is a penetration testing product that is also widely used by threat actors.

Like other malware loaders, Matanbuchus is engineered to download and execute other executables on the target system, evading detection and opening the way to wider exploitation. Matanbuchus’ capabilities are extensive and include the ability to launch a .exe or .dll directly to memory, add or modify task schedules, launch customer PowerShell commands, and leverage a standalone executable to load malicious DLLs.

It’s an extremely dangers malware and can drop tons of threats on compromised systems. Explore the Matanbuchus Spotlight and learn more about this menacing malware.

Past campaigns

images

Banshee InfoStealer

Banshee InfoStealer: The Threat You Can’t Ignore  A Next-Gen Malware Demands Next-Level Defense: Banshee InfoStealer is rewriting the rules with stealth tactics that evade even […]

Read More
images

Sandworm

Spotlight on APT44 (Sandworm): Defend Against a Notorious Threat APT44—also known as Sandworm, ELECTRUM, and VOODOO BEAR—is a destructive threat group linked to Russia’s Unit […]

Read More
images

Fancy Bear

Inside This Campaign: Stay Ahead of Emerging ThreatsDiscover Fancy Bear (APT28)•Who they are: A Russian cyber-espionage group linked to military intelligence.•Their mission: Advanced geopolitical intelligence […]

Read More