GBHackers

Matanbuchus 3.0 Unleashes AstarionRAT via ClickFix Social Engineering and Silent MSI Installs


Matanbuchus 3.0 has resurfaced in a tightly orchestrated intrusion chain that blends ClickFix social engineering, silent MSI installations, DLL sideloading, and a new remote access trojan dubbed AstarionRAT, underscoring how mature loaders are evolving toward stealthy, multi‑stage operations rather than simple payload delivery.​

The attack starts with a ClickFix prompt that convinces the victim to copy and paste a crafted command into a local console, effectively turning the user into the execution vector and bypassing email and attachment filtering.

The command abuses msiexec.exe with mixed casing and the /q (silent) flag to install a remote MSI package without any visible UI, ensuring the user sees no installer windows or warnings.

The MSI itself is fetched from newly registered, brand‑impersonating infrastructure, using obfuscated URLs that collapse to a single download path but make proxy and log analysis more difficult.​

Once executed, the MSI deploys files under fake “security product” directories in the user profile, dropping renamed legitimate binaries alongside malicious DLLs designed for sideloading.

Among these is Zillya! Antivirus components and Visual C++ runtimes, plus SystemStatus.dll, which acts as the embedded Matanbuchus 3.0 loader.

The Huntress Tactical Response team and SOC responded to a hands-on intrusion that began with a ClickFix infection, the social engineering technique that just won’t die.

A renamed 7‑Zip executable extracts a password‑protected archive that contains the full Zillya sideloading bundle, reinforcing the theme of living‑off‑the‑land with trusted tools wrapped around custom code.​

Matanbuchus 3.0 Unleashes AstarionRAT

Matanbuchus 3.0 represents a ground‑up rewrite of the loader, sold as a high‑end Malware‑as‑a‑Service aimed at targeted operations rather than high‑volume spam.

In the observed intrusion, the operators used this foothold to move from initial access to domain controllers in under 40 minutes, leveraging PsExec, rogue account creation, and Defender exclusions tactics consistent with pre‑ransomware staging or large‑scale data theft.


Intrusion timeline (Source : Huntress).
Intrusion timeline (Source : Huntress).

The loader is heavily padded with junk API calls, dead loops, and opaque conditional branches that inflate the control‑flow graph and burn sandbox time, complicating both dynamic and static analysis.

All sensitive strings are stored in a single ChaCha20‑encrypted blob; an index table tracks offsets and lengths, and the loader decrypts required strings on demand with a shared key and nonce pulled from the blob header.​

Core shellcode is stored externally in a file named INFO, also ChaCha20‑encrypted, with the key recovered via brute‑force using a known‑plaintext check based on a Heavens Gate shellcode prologue.

Once decrypted, the shellcode reconstructs a hardcoded HTTPS C2 URL character by character, downloads the main Matanbuchus module, and decrypts it in 8 KB chunks with ChaCha20, using a custom header format that includes a 32‑byte key and 12‑byte nonce.

Before executing downstream payloads, Matanbuchus enumerates running processes for EDR and AV names, allowing operators to adapt their playbook to the victim’s security stack.​

Advertised on underground forums at $10,000/month for the HTTPS version and $15,000 for the DNS version, Matanbuchus 3.0 boasts a new client and panel built from scratch.

Matanbuchus 3.0 advertisement (Source : Huntress).

The next stage involves a second DLL sideload chain with a legitimate java.exe and a malicious jli.dll that embeds a full Lua 5.4.7 interpreter to orchestrate shellcode execution.

The loader first unhooks kernel32.dll and ntdll.dll by mapping clean copies from the Windows KnownDlls object directory and overwriting the hooked .text sections in memory, stripping away user‑mode EDR inline hooks before any sensitive API calls.

It then decrypts an auxiliary Lua script (SySUpd) with a rolling XOR key, loads it into the embedded interpreter, and uses custom Lua‑registered functions to allocate RWX memory, copy shellcode, and pivot execution into a reflective PE loader.​

This reflective loader consumes a custom binary stream format containing the Stage 1 DLL components, including the .text section, encrypted imports and relocations, and XOR keys.

It reconstructs the PE in memory, resolves imports by hashing export names, patches the IAT, and finally passes a large compressed Stage 2 payload to be decompressed via RtlDecompressBuffer using LZNT1.

The output is a raw PE image identified as Beacon.exe, which is mapped into memory and executed as the final AstarionRAT implant.​

ClickFix Social Engineering

AstarionRAT is a fully featured remote access trojan with 24 documented commands covering file management, process control, credential‑backed logon, SOCKS5 tunneling port, scanning, and in‑memory reflective payload execution.

Three global constants stored in the .data section feed into opaque predicates repeated hundreds of times throughout the binary. 

Junk code obfuscation in jli.dll, arithmetic expressions using fixed constants that always evaluate to the same result (Source : Huntress).
Junk code obfuscation in jli.dll, arithmetic expressions using fixed constants that always evaluate to the same result (Source : Huntress).

On initial check‑in, it builds a metadata structure with a 0xBEEF magic value, randomly generated session key material (later hashed with SHA‑256), system code pages, a random even beacon ID, PID, privilege level, OS version, local IP, and an identifier string combining computer name, username, and process name.

This metadata is RSA‑encrypted with a hardcoded 1024‑bit public key and sent over HTTP GET, with subsequent task results returned via HTTP POST, in a polling loop that defaults to 10‑second intervals.​

The HTTP profile is crafted to blend into enterprise traffic, using an Edge‑style User‑Agent, Chinese language preferences, and a Google referer, while embedding the beacon data inside a cookie value that masquerades as application telemetry.

C2 domains are stored RC4‑encrypted and hex‑encoded in the data section, decrypted at runtime with a 110‑byte key, with one observed endpoint masquerading as a legitimate “organization events” intake path.

Indicators of compromise (IOCs)

ItemDescription
hxxp://binclloudapp[.]com/466943ClickFix MSI delivery C2
hxxps://marle[.]io/check/updprofile.aspxMatanbuchus C2 – serves encrypted main module
www.ndibstersoft[.]comAstarionRAT C2
/intake/organizations/events?channel=appAstarionRAT beacon polling path
%APPDATA%AegisLynx Cybernetics LtdAegisLynx Threat FabricAVUMatanbuchus MSI install path
%APPDATA%DocuRay Technologies S.r.lDocuRay PDF ProfessionalZAVYMatanbuchus MSI install path 
%APPDATA%HelixShield Technologies ApSHelixShield Adaptive SecurityAPSZAVMatanbuchus MSI install path 
%LOCALAPPDATA%TempndvyxgdriggmarrfStage 2 DLL sideloading package drop path
INFO

SHA256:

de81e2155d797ff729ed3112fd271aa2728e75fc71b023d0d9bb0f62663f33b3

Encrypted shellcode payload delivered alongside the MSI, contains shellcode that downloads the Matanbuchus main module from the C2
SystemStatus.dll
SHA256:6ffae128e0dbf14c00e35d9ca17c9d6c81743d1fc5f8dd4272a03c66ecc1ad1f
Matanbuchus Loader payload
jli.dll
SHA256:68858d3cbc9b8abaed14e85fc9825bc4fffc54e8f36e96ddda09e853a47e3e31
Stage 2 loader, decrypts and executes the Lua script from SySUpd
SySUpd

SHA256:03c624d251e9143e1c8d90ba9b7fa1f2c5dc041507fd0955bdd4048a0967a829

XOR-encrypted Lua script
Reflective PE loader 
SHA256:8e54cd12591d67dfbe72e94c1bde6059e1cba157e6786aec63f8f9e3c71fb925
Reflective PE loader that reconstructs the Stage 1 DLL from a custom binary stream and passes the final payload (AstarionRAT) to it
Stage 1 payload
SHA256:

c31c8edbf94c85cc9bc46a5665c45a3556c48d5ad615c0a44e14e5406d80df12

Small loader with no import table, XOR-decrypts and LZNT1-decompresses the final payload, maps it into memory, and creates a thread to execute it
Beacon.exe

SHA256:

eecc83add16f3d513a9701e9a646b1885014229ac6f86addd6b10afb64d1d2af

AstarionRAT
Updprofile.aspx

SHA256:

ea378496135318ac5ad667a032fa4a9686add9d27fe4a7c549c937611b5099e5

Matanbuchus Core Module

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link