Threat Actors Using Matanbuchus Downloader to Deliver Ransomware and Maintain Persistence

Threat Actors Using Matanbuchus Downloader to Deliver Ransomware and Maintain Persistence

Threat actors are increasingly abusing the Matanbuchus malicious downloader as a key enabler for hands-on-keyboard ransomware operations, using its backdoor-like capabilities to deliver secondary payloads, move laterally, and maintain long-term persistence on compromised systems.

Initially observed in 2020 and offered as Malware-as-a-Service (MaaS), Matanbuchus has steadily evolved, with version 3.0 identified in the wild in July 2025, introducing more sophisticated network serialization and encryption features.

Matanbuchus is written in C++ and primarily functions as a downloader and backdoor, designed to fetch and execute additional payloads.

It consists of two main components: a dedicated downloader module and a main module. The downloader retrieves and launches the main module, which, in turn, provides a flexible command-and-control (C2) framework that enables threat actors to execute binaries, scripts, shellcode, and even .NET payloads directly in memory.

This flexibility has made Matanbuchus increasingly attractive to ransomware operators seeking reliable initial access tooling and post-exploitation control.

Recent activity observed by Zscaler ThreatLabz highlights a campaign in which attackers used Microsoft’s QuickAssist, likely combined with social engineering, to gain remote access to victim systems.

Once access was established, the threat actor executed a malicious Microsoft Installer (MSI) package from a compromised domain, which delivered an executable that sideloaded a malicious DLL.

Overview of Matanbuchus Malware

This DLL acted as the Matanbuchus downloader, pulling the main module from a remote C2 endpoint. ThreatLabz assesses with medium confidence that these actions were part of a broader ransomware deployment chain.

Matanbuchus employs extensive obfuscation and anti-analysis mechanisms to evade detection and hinder reverse engineering.

Strings are stored in encrypted form and decrypted at runtime using the ChaCha20 stream cipher, with encrypted strings and metadata organized in dedicated arrays.

Windows API functions are resolved dynamically via MurmurHash-based hashing, and the codebase is interspersed with junk instructions to frustrate static analysis.

Example of junk instructions in the Matanbuchus main module code.

The downloader further incorporates long-running “busy” loops to delay execution by several minutes, attempting to run past typical sandbox timeouts.

Network communication is equally hardened. The downloader includes embedded encrypted shellcode that is decrypted using a brute-force known-plaintext technique against ChaCha20 keys constructed from a decrementing integer seed.

Example of junk code and long-running busy loops in the Matanbuchus downloader module.
Example of junk code and long-running busy loops in the Matanbuchus downloader module.

Once decrypted, this shellcode downloads the main module over HTTPS and decrypts it using ChaCha20, chunked in blocks to process large payloads efficiently.

With version 3.0, Matanbuchus adopted Protocol Buffers (Protobufs) to serialize its C2 messages, wrapping encrypted Protobuf data in custom packets that prepend a random key and nonce for each request.

After deployment, the main module registers the compromised host with the C2 server, exfiltrating host and user information, including hostname, username, Windows version and domain, installed security products (such as EDR and XDR solutions), OS architecture, and privilege level.

Mitigations

It then writes a registry marker under the current user hive to track registration state and establishes persistence by executing C2-delivered shellcode that creates a scheduled task named “Update Tracker Task.”

Matanbuchus network communication pattern.
Matanbuchus network communication pattern.

This task launches msiexec.exe with parameters pointing to a randomly named copy of the malware stored in a uniquely generated directory under the APPDATA folder, tied to the system’s volume serial number.

From there, Matanbuchus acts as a full-featured backdoor. It supports commands to download and run EXEs, DLLs, MSI packages, and shellcode; enumerate processes, services, software, and Windows updates; run system commands via CMD, PowerShell, or WMI; and even terminate itself.

ThreatLabz has also documented campaigns where Matanbuchus was used to distribute the Rhadamanthys information stealer and the NetSupport RAT, underscoring its role as a versatile delivery platform.

Coupled with observed hands-on-keyboard activity and a growing association with ransomware affiliates, Matanbuchus represents a mature, evolving MaaS capability that significantly lowers the barrier for conducting complex intrusion and extortion operations.

Indicators Of Compromise (IOCs)

SHA256 Hash Description
92a2e2a124a106af33993828fb0d4cdffd9dac8790169774d672c30747769455 Matanbuchus MSI package
6246801035e053df2053b2dc28f4e76e3595fb62fdd02b5a50d9a2ed3796b153 Legitimate executable file (HRUpdate.exe) used for sideloading the downloader module
3ac90c071d143c3240974618d395fa3c5228904c8bf0a89a49f8c01cd7777421 Matanbuchus downloader module
77a53dc757fdf381d3906ab256b74ad3cdb7628261c58a62bcc9c6ca605307ba Matanbuchus main module
gpa-cro[.]com URL of malicious MSI file
mechiraz[.]com Matanbuchus C2 server

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link