Security advisories

Matanbuchus Malware

June 12, 2024 | 4 MINS READ

Speak With A Security Expert Now

TALK TO AN EXPERT

THE THREAT

Beginning in May 2024, and carrying into early June, eSentire has identified an increase in observations of Matanbuchus malware. Matanbuchus is a loader type malware that was first identified in 2021. It has been used to deploy a variety of secondary payloads including Danabot, Qakbot, and Cobalt Strike.

In recent cases observed by eSentire, malicious web-browser advertisements (Malvertising) were used to direct users to threat actor controlled web pages. Users were instructed to download a ZIP file from the website. Extracting and interacting with the contents of the ZIP file results in deployment of Matanbuchus. All recent incidents were disrupted prior to the delivery of a secondary payload.

Use of Matanbuchus by threat actors has been limited in the past two years. The eSentire Threat Intelligence team assesses with moderate confidence that a new campaign delivering the malware is currently underway; this assessment is based on overlapping tactics and infrastructure observed across Matanbuchus incidents.

What we’re doing about it

What you should do about it

Additional information

Matanbuchus was first identified in early-2021 when a threat actor operating under the name BelialDemon began advertising the malware on multiple forums. The malware is offered in a Malware-as-a-Service (MaaS) model with an initial reported rental price of 2500 USD. As a MaaS offering, it is likely that multiple threat actors are currently using the tool. Due to the delivery and infrastructure overlap of recently identified incidents, it is highly probable that a single threat actor group is responsible for all cases observed by eSentire.

In these incidents, when searching for “fund claim” related information, malicious Google ads directed users to an attacker-controlled page; it is suspected that users are prompted to enter personal information such as their name. Users are then directed to download a ZIP file; the downloaded file includes the user’s name to add a sense of legitimacy to the download. Upon extracting and executing the JavaScript file from the ZIP archive, the script downloads and executes a Windows Installer package (MSI) which is used to deploy the Matanbuchus DLL payload. All incidents were identified and remediated at this point, as such, eSentire did not observe the deployment of secondary payloads. While Matanbuchus has previously led to the delivery of Danabot, Qakbot, and Cobalt Strike, it is possible that alternative malware would be delivered if the incident was not quickly remediated. It should be noted that Danabot, Qakbot, and Cobalt Strike are all known precursors to ransomware deployment.

In order to defend against malware threats and browser-based delivery, it is critical that organizations take a defense-in-depth approach to security that includes Network, Endpoint, and Log monitoring to identify malicious activity. These additional layers of security are crucial to identifying and mitigating threats in case the initial delivery of loader malware is successful.

Indicators of Compromise

Indicators of Compromise

194[.]67[.]193[.]205

IP Address

193[.]109[.]85[.]174

IP Address

194[.]67[.]193[.]201

IP Address

194[.]67[.]193[.]202

IP Address

194[.]67[.]193[.]203

IP Address

194[.]67[.]193[.]204

IP Address

194[.]67[.]193[.]234

IP Address

194[.]67[.]193[.]235

IP Address

194[.]67[.]193[.]24

IP Address

194[.]67[.]193[.]25

IP Address

194[.]67[.]193[.]66

IP Address

194[.]67[.]193[.]67

IP Address

194[.]67[.]193[.]68

IP Address

194[.]67[.]193[.]69

IP Address

194[.]67[.]193[.]70

IP Address

194[.]67[.]193[.]71

IP Address

8[.]209[.]103[.]236

IP Address

8[.]215[.]3[.]107

IP Address

2981CCAE916613B8AADC9EF7F54EA5CA29A93558

Matanbuchus MSI Loader

BDB194484F54FF4DC85DF6D9CE6C61DB1580C2AA

Matanbuchus DLL Payload

CD775E19BB053BB84BCFD5C8ABB30B8A1BF35EF1

Matanbuchus JS Loader

CD775E19BB053BB84BCFD5C8ABB30B8A1BF35EF1

Matanbuchus JS Loader

hxxps[://]treasuryfinance[.]org/report

Fake Fund Claim URL

References:

[1] https://learn.microsoft.com/en-us/defender-endpoint/attack-surface-reduction?view=o365-worldwide#block-javascript-or-vbscript-from-launching-downloaded-executable-content
[2] https://x.com/ffforward/status/1461417886526984195

View Most Recent Advisories